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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0xfffffffffffffecb) 17:50:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000000f000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140060003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:24 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5d2b90ef) socketpair(0x15, 0xa, 0x100, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000240)=r1, 0x4) 17:50:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:24 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, 0x0, &(0x7f0000000380)=""/218}, 0x20) 17:50:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400f0003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0xc, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140200003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000033a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:25 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:25 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, 0x0, &(0x7f0000000380)=""/218}, 0x20) 17:50:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140070043a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140300003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:25 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = gettid() socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001c40)=ANY=[@ANYBLOB="3800000000000000840000000600000098b23ece83717e2ddf61e28be406d54e2f06854b13aedb955433f502b34b6188d6f659cd0000000010000000000000000d01000009000000e39e083e2f4b3efb9122dd5ac35fb226a8b8a421acff22e8483ffa5c02194e8d8b554edc19d55a93dc00ae4dc2f31e9facd56086ea75ec5b08bfbe7ca0d8f960e0fa3eb9aa68b0a696c1c65356093103de74128acad358432c6bccb1dd945fab87a717285c0d5dde67079656f52ff1b29b74d9fcb3fc1e49fb45e5c66c84fe7cfc31e27c39f85a90b8cab9"], 0x48}, 0x4000005) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x401, 0x10000}, 0x50408, 0x2, 0xd1, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@sco={0x1f, @none}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000000)="a47b60", 0x3}, {&(0x7f0000000200)="60de57cd8d88896dd0d20fdb7de50c497d485a0c1a8884678513342fa85b7dec76db7ea01f0a37ce34fa174a1447463a7f8b02ec288b10d43bfecb26dd34a0261dd8da3438cd39d356b44cb9defe2d200061e8c7303afaffed18ed057dd6be73cf35c7c5ee9e2a18a8671a37ca", 0x6d}, {&(0x7f0000000140)="b9fbd60541cae014b6b09f35fcc80d380cb5a14eeb471f73128695251386d6511d57", 0x22}, {&(0x7f0000000280)="adf5e1eeb47e2f7d96b20e3dd56766b18638003faa493018fe276d46f30bed5d987ed68139d59bd03d2255219c0d8412d4825d1224f63e3c4b05f1f076894926bc65a681c9886149aca295036f0c744f0f9181", 0x53}, {0x0}], 0x5, &(0x7f0000002480)=ANY=[@ANYBLOB="a0000000000000001301000000000000127f93cf63ee3ec0c61d3bf0a427eba9db6ec9bcd29a94d677a2c0ec8bd4cdb97ee4064816e036b02ac6bc971edff0e4dfc050dfcd493ba0ca75ecf6f0e4a6bff486f73800afa7533319ba44d397021fd7c474c505fb4c5050353f4f0b0648c0af3cbd78506cfe9be6ef226ccff8c9e8bb8549471a686f0466e72f553a000c4f92f2db8d7504d01d320a29240a215394e800000000000000070100000700000063a6cda103ff28fc0b6d5c0a7757c1b32be9a1a013acba5d41ed940e1bf2e4f1b4459dfa45aed8855e4eb346fe203ebd42b53cca47d467ff9b27eefbcf46655fce7bb224b9eeb24d05708e8735c473766bc868ac9d00fa46a294b6d0c51f687f34d90c27a472b326daca6b0fc753961ec9bb1ee1c62c5842ba8dcf51062bc543f4f963735cb36eca0df3d47a02ae0e428e570f44d0a3bfc0afe75dcc90d6e5268fcad02a949233cb077053e0d0d1c6defbc3480d3b90aa4734ed1aee632582b0af6d52116d6a85884aadc644a59581693466bd0000000000b8000000000000000a01000002000000d437b72d44c1f094d76cce59cca52c8c6542a33335462b769599b9af4134f7cd587f7cb6ccb90d916008cf64445f8342bfad2637f030c1459d1dcdb2ef7d2404eec1344249b2012606bba2efafe5188bf46ce4e5fbffbeb1328feed48483e1fea263dd0bc242a266d9fb29c186892284f2d91fc614f9e7b1424405848bc9cb703de1935715df13c24e384a3f27ac043956c81aafce4063319c48786b50f67c7108b0401216ba0000957937f3dc50593dec8dbe1b1f304352e75ad9351922a8c2e23b613aed40ed2092a731fec7d462d5136f7257baabc05aa7"], 0x240}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={r1, r2, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000002000)) r3 = socket$kcm(0x29, 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000480)="61800b307420cf0013cef4d210f3b9131caf04851c81b632253a832f19b783b77429c01e795bf8d80575db8fcb9055951319847683aecdee55746d990ab413750af5a027947aad17c073bb236c0b0f29069035ac7372903ebabb3c9c3ded5121928b10986f78195112bee1ee76", &(0x7f0000000300)}, 0x20) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x00') sendmsg(r4, &(0x7f0000001e40)={&(0x7f0000000340)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000000880)=[{&(0x7f00000007c0)="4a469a7585cf1321da1d87798e5353572e646eb495df9e61ab5b57a52f192bb2c6074891d9899287d59a0326ef4894967af4d460588e584511dc056c1765f26654d5e32570d819274f3a9ab6d0b57c35eca4fcea9d9a2f95a8f15c81669c844b054adb317ad86dcae1f4b1218a509bb4dc5e82232d610344ea3dcb03449aa4bc33d51626e11d4b649d65d2009e5f36385ea565787dd679127d361bb59dff18aa978d6763668b15ace361", 0xaa}, {&(0x7f00000003c0)="64077982555543b0ef6908d4a70dfbab0d573b6df8389245e5dbaa", 0x1b}], 0x2, &(0x7f0000002040)=ANY=[@ANYBLOB="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"], 0xf8}, 0x4001) close(r3) setsockopt$sock_attach_bpf(r3, 0x1, 0xd, &(0x7f0000000080), 0x2cb) close(r3) sendmsg$kcm(r3, &(0x7f0000001c00)={&(0x7f00000008c0)=@caif=@rfm={0x25, 0x0, "5560c49c053f7198b23a6d1d7f1528bb"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000940)="36934c603a8a12d38c85b40cde9135c3758b4a0095a16b6a9d05c355806deb86e3b5cdf8de0372c25d5ad0c7f296e883140302f4cede055d99d248b57dd06e5186ab110a0d014fe1d25f00209dcdde91f6f3a5cb5d6685442e9d5216e21d85f6f5061d8a45bcb304d52a45978e28967e7be3ca79d9834536a28bb516f81feea388", 0x81}, {&(0x7f0000000a00)="ca8830d8f8d6eae7bb34ff0470f48c5b486eaf47e5b707594e14e1da40733b3c11f7af0b48a3ce029b3954f25555e22e52cbe1bbdc2b680bb688f1ac0e924344a1242632b27a0bd96af3e5eab85ef64c2d485c1c101934eab39a3b120181ebc0edb5a4d2636411641af4482f6bd46730da115786a9c778e73a66b559caf4116b543d46a0683e38bfd413d311c8bcaaa893275d7cba540ceb48c37e43ba8e92500884b6846e58f57e90116c0f4fa056762ce15c0dc48d478f57bdb6e6fe864712d22ce019ff7020e729cf60faca9b86966c6c36c876ae39091c8e22aead7fb957357a4781227d92a50da7fbc2", 0xec}, {&(0x7f0000000b00)="5d3c84e5dccb74d19f66dccdad1f55f6215894ddfc82c9df21aa90dbb65f5e7473cbac0dbef5b85840394882b3ec297a1660aa4c6d7ff6c0ce584654253fb72a9a7694e3ebf54243e75b041de22d5300848f8b368320bc53d2d3fbb5c61ab62ea81c303bc383d0ab847609e55b71022060df8a3a28207bdbd7d4d88beb42203cb7c57c85af0f01d2b1e01c77c5460620f269bce62017595f3f4c2717599ad9a518ca82bc8d55a48e273aa82f7dfee4cf404181137d88b7ddc0074107052d289e2bd7687224a5ad32a39a6e65a08ba80e02feacd398e658e3a854f4c3f65897388280efacf541ba0e62c8b450968e16fcc1217e40c34d2bbb", 0xf8}, {&(0x7f0000000c00)="519839f77f4ef8a1e4e586e5d31313f92ddf77be32d760af4742369b3bc3364e60e2b1224ac4ff5ef276cecb7e5df218e16262716881751a8ee01df6d8f50d18da79a791f5d77ce6ef7b0ad20da3ecdd3d492b5d416f562a99b8153adad10ff28398c6f7cdd907d5c2d80fd6d24bf1c19e3ef08da3f8314c09349a6db866b9750e5550fd5e69ce8fd11fdf27d42aecb6b3cc5e7d5d4dae7588cd53dd046dea350ecd1a293572bd4b78c24c806416c83ed326ecdd1e463df0b56e08607df91b2093e8dcf530fc899e9d2496bda2905a4353098718e98ce07b3ad688b7124d98e39dd074f3d8e91356327c5f5e3f1e0e0a4d8dea69028dbfc79014337a7ae2759bc6195338bf8fe87efafa175a1704da19940c27cc4788d3ae25523d7b6464247f087d80ce345fb8bcbd0bd07e2b9381ec355e68f9351cf1df77f1e7eeb2a82c5313acfde908d4eeabe2058f5700f4842fc687f860e82a51c46711f89d781b4ae7a02d8324ba7ef43b06642de7da40aedda0a3eebc18266ee5d245a1eef87ddbcc78fe9c64016ea53f0affecf2adf2af3b28fa7fca14bf141bfc51169ff62d7041dbf2848817d3e292607d1097c5607208183c201badc5fef4ce997f9f5237117e04eedd1a863a7778b4383fb3e5f302007b04ebfd551086c3c6bd9f72947769e62e962ac3cfae08662b4ad85b68f3690fa8e4d694e542a5fa774ad5bf9e8c452664e7678f82cd107c55e5b8c1a1b48ba519c4fe22780110fcfb83b2f41a1f45e21fc134c5f71ff045d3cb00701fffd2892093258ed0320b8b54a463b4277f8745e38ef5a17cb60c9dd4b9acf5517a5d7deaa1c3faaa29532e6e30304a6e9b45d6c8007f77afe1cb35a9eef7cbb08b1478c617ecb6fc1a2e3b7e3d0069ab108f0ebf52c538811884605ca010204beb95bd2fdb7005e67688331f28f5c4e7bb0a89b5d08b74a190a5039607232442e20bad8a074fc5f76efd7b4a76b8ea69d452f5a0df33eef5b59ac0ccde7051ea43f9b0bcf47c8013b78680ac4ea6f71a9f681056cb02496624a058e3a5e5739c812d1cb38c1387117e2390337f27ddc8532977dcc30e0b07a38d1ebcc3cb3ad567ca194c50c585d6bfbec5eb5d4636babcd41e8ef6b92e1f029fad2091405485756299eba7da1e51d89a2b1c5b8213bdb7e270599486fd78e4893e08b402a2d2358ad4d2cdf8f82e3b7d9cb2083426d8c61623963dd9828993a84e29858a474e49b5dae2efccc6ff8290f088e7695b30d40a1cf546e52016b4d7eb464ebc2cfc2dfdc56d284bfb5573f7fc51438fc3c8783ea8692dc478d9d5216b38ae7ff6b86cebd111ae31749ef2550d148fa49c3f8dc9abdb0e2c0944ebaa04e0775d922b17b2f3988e9b4c14639a6d056ecc68cec61072af59597deeb8f6907f994054eac9da910bd59516087b409da9fa45dba10dc2090e37152b5bf310840e4316ec3d3b5b41b3fddfbcd005975cb73c621d72e7e5cf07296b4bbf4d3772fd2a112c29bdbd4f2379f30f3fa5c6666bbf03d5ccee5c9130156aa9cc5a3ec675f5b6ea0626c78b5530296c3f1ede0088de73a12f185ceebc3a5c7ac53eb7d3816acad5da646c2fe8945f5283998fa4d1db7aa566942cd59b17b4c3e5f0c863bc8957895a025e2bb01ad5b65322402b8fa903e3ab8472e05362c9c7b16111ccb6fe39e03e25f5284a2d276fa22c04909c69f9ee92fe42b3d19026e0566a28fffb0c5b5527530590c2c8c5282472272842e1e008a3ba2672455ec71d6499c4f60d158e18546483404d205e3ff377ec15b9755d280ff4539061974a37a7ae7ed6a4cd1e88bdacbb4c105efd0d9a596f5bfac62e7fc19031fb21e7ebd5726bc6643a278d4c616c97a2c383a97e0346cee4c1a4222bcb92ce131b25c35a34dffeaa0b5033a056f90a101e439d7b28f0ea71469dd27f3e309ea44f643c3010cd3c9bc353194908f932a83e82bf32398304a330c7a08592af83fa25a2c37e542347b0361230ff1ac92e177c7635069b801be5bf3e9c14413d73b8bf37184d9adc6049e0924cd519365944ae4b5bf8032ffec3d4ea2412a754498c6523afb0024a7b2d1526b0473747d824a29e572663e75ab1e665678b2a3270fbd6a8e8dbddfb5d6d77fe0ddd35a07f949a915a1c905c95163a9dd95691920ded6d1298381415e225c4386c1694fac6643e920be929fcbb936649695e158757975b3c6741f9445d50d3575859977483c98abd34ff390cd8cbd207905c1372de47fc1d009836f9d74d7e02f90cf5a523d9e9b13bcbd5747ca8a4512bd4ad19021947336ff86f3974f8b55c8a0fbb997251a12f200d36a72af3d725718b30edc83ad2aacd7f8071f601cd42f3ca424fffa67419b202241b89b3703ae8fdee775a5e2de61f0260da4791da7629a33b09c9c9e9e9a4586b78dce92754337bee7524157e0ac62137bb027f2e9fc0ff7614843121c575334a92ee4c0990cc17dc641c743b57623c162b4a173a3deec28e885d2116ab5e3cfd1d27ec177ae1b961a781d3f763580c7ea1284c14737e177c87ba571a94813b6519a57e8ebd26fe15d7ae97f46573625352fbb79fc19e91b21b171a5f20658cb3206ca031b45ffc14bee6c82852da9999fd03e6e16120e4c097b22c675a5cf40f220f90c3db2b08014936857033e8e37a544b2176c3d9e9816966137745400952de946fbee4dc4ca0ec9593398d049278fd0c641a6472d3f8c8908cbd7c28d1c54e55b8a6ef6ebe5c11621acc3773e6e223c59503a3da3ff6f98779a2ca6248f24a4c8d2eacf667d3d9ad182d251ab425a714a03d409d3b75201e63973e3dffa53b5e3347cf2452aef90faad4e444ca569143245f3a90e6e00a7b98ea715dfebd32110a55d752300001411c592ef9f8195e66087f6450fbefbaec2f1f525c5c3b7c64fd363886266cc513207aca458485e046bba53f055e45eefb50364b8bd649ae04e21c074cc8c32216edc248fc4288108de49e3e91949d9452805a836e6bf52e133d83bbb7b176ce84203e00937109f247d4c92ff2c003c7ad75187c1c12df35e7b16ae021ef70d800c150df863a4db02e67c6173d73c024b620506d8d3e9f51c9de6caac08545d6108ca9be145fcb9d9cd3bb9ffb646480eb4ccb0803495b5fcb6ae62f788858f912cfad11c3d182674301eab9bcb101452b4e474e32505c4f9bebc5afccce293d5bf00d65bdbe709b3d2b763b9967a1aea083c386e768e5e045b35e47377e5e3b69a97f0a73bdd804c3eb807f7b8e39c9cb2a05fd866571f6488e5cb2df3e7013d06b3ae57393173efc939cf638fd3af0f734e5f0fe8f16742d504b7156e1c2626237a89988a10293c53e200bcada5120442d992184fa5faffda55f80f8f33c1e6749e4b28fec0c1e7a28b102d2343931259fb5bf3bf98aaf71d691f02e0797b25fa2da8bdf6f64dbed87720871d30a87f35fe2b56c3a5aba50601c26145232a6ecde722a07263ba237ab3f8c8e811df80277e706b32382da2d60afe6a8fcad9b065b80b4eb7d9ea781412dc018faf1be0c8a15ee1b15af16d602e6c6055d9d97d865dc4be1ab4e68b4b5503882c497baca186c3536830cc654e31be4faf67804c86cba376dca8cab75485739862e77e6b50b73e25365082492f29877e64e68e6e1f95020b2ac0d869686cefaee555f8e7668a978e418ce76724462c148e6f6499bcb1929ba552159998c8bdb5837ec3efb4da9059746d4139e1a16733bcadc923d9d5c921a9e58c6b77d09af7be7ae284e879b400fcb69711cb16038283ff94d51a06afa43c1dad16a1615964e73f6930295ee6562281e68bd098fbfd134f62175b6a8def7f44be89fef9fadbbb1e684274762e195fd554fe0bb66f73e054fa11841787b78bd16caaef68fa2a7abc35b101ed89dc6cab38658ec224faf89d3f17f5d699c2869c5de7e9c1a233ac58154b728d2698981fc1747206011bec89aa74674d781950220a89a0f8216485f7663509474be81c92a57155c78d0c1de288ab6621d37b3d5cd4c267cab5528e8949335284783710efca8715c359ac81892ba7e83ce673655b40ba2e87ffb28ea9596cc5f5200929f35660df7d3c25ab77355e77b581cc3704a97ff1f9991017593a8bd439be3f78c94a054142fe9eeebfb7e93886c0fd326096504b9a898356330f0823691688a5a350721b6886b7811d659cbab2e770765bce3a7dd15599a22543a4e0ed72cd857a3498dfe6f97a1f7d04ecd0bf9f1cea21cd07792be392b77367541ce01b474026c87a040e6beaa3e5d23feeaaab70c2ba6a00dcbf49322ba11c6516212d6d68224163e9ac32e756c6b6e332a53da8fc52434c286adef92dbc19d1e2e7a8ba517dc4e084af52b13f6fa7cbfd1495f3b1f70ab99431d90cab29c3514cb50384c63eca34f0c42b0b2c67f6cf81174292ebf77b05ec194b85f5fd25dd3ebb905eb431b08efbdcd7af1a1ee5e038797c0cb1e4babaf643059f1d19d28605b5dab82cc95dd89989680e0695b74a10d634d8f05122a27220e1e3e4e7a72e73c015128a29d7ba9667af07f2baccbbc9b604bbdacb4ce93ac91e0a36550d1a674b0c6bddb795afebe50512377b491d8aaa1f1cb311d5bc697adeb7f4f1f1ed5694b08bc37133881d8cae67825c48816acc844754ed4d69db5d73532a0d260b8ec500ce02b9463aa9c8bc5c718db867cf94109ca216ac305dd487ee05cf092b5950be9d7e41504f0287eebf4e27dd9df97a9f248bbe18b4498ec9cd7d7510b9b986e0f2aeea5c997bb92cc1a9da31c927e6778a212426b4069307c75331b3695cb7bfeaa2bd6bed1bed25380f90619d1ab6d4e070becb61872d416da68053ff278461989f57660072735f138195c538a7e9211814f19bb5935edbf6874fd919de890d45c8cad83865cbdd636d109f9f6b5a437a6dcad3f642962a3db14c2792b0e9cf2ebf313c2c6676fec9816bb384cff90743608737879974f52c6b61f71d4738d997e5fd2726ff6819cd77aceb3a641781f2fc69d18f22971ff49a81546bfa714539fab56f58c2521504708f99d0ce76457719c0e3b41bff525e81c532a9554261a616d6bf8c17475e976b0aabe9eaf86d98bf3b58d96af61aa622b58bfa8e04b1ef5b44282cc2b5797db35fa50f645507b3ad08fb3948c4eb5872b63f47ea4543dfbc62880050398a6e8e1a24e60e9a60bc4ce6098447fad652e419725474c361266e459f5000e9de80cd4e5c4103cd78138faa00fa424b8ffa3d44e701edbb6df756df368c89ce5a086e7e1f6a31212be93d33d0b451b141c36082fdde5afba8f7ac2e59dfc31a45345c972c601c2ce6711369ec226f7c160be353e1c93aaab1341cbe5fc100f1830bc222ac07f38c11d9e908af9957d14bfea51ecb5f0a792a1c1cd42477e6d1af02bf674d1e11ff3d2ff547ae9a21e06c5b598daa011bcae2233eaf60cfa9210189c9cae2bd53746f14b7ec9318f6f5ff43996ce7f27e9b842119f2c36656095dacf27b36e6b7024c06cc98be037a3618938ad95b33d465130a6ce3439501f5216ce62b1e0edbfae1e5f65892d5e4e827902d97357e36cd37df0dad351c1c36aa248ac1b76bcf03f7fce47709e8dedaa74bf5ee0805d7f4b0270dec338cb37f1d29c47f1e0ee865458f2b7d833d2f8185ad4a11e76c21e11bcea6a910ec9186e94163d22018952fec29a6678fd0fd0477ebc4a09653e47db585c8797a5ea5ce8f97a1a88c99a26bc2c625a873f32fecf81a4bab3c8a80f0c1ea94c14115652544a91f44ae26b94", 0x1000}], 0x4}, 0x80c0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 17:50:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000093a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140400003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:25 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, 0x0, &(0x7f0000000380)=""/218}, 0x20) [ 478.725072][T19209] netlink: 'syz-executor.0': attribute type 22 has an invalid length. [ 478.773823][T19209] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.0'. [ 478.893314][T19220] netlink: 'syz-executor.0': attribute type 22 has an invalid length. [ 478.901839][T19220] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0xd, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140800003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400000e3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:26 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040), &(0x7f0000000380)=""/218}, 0x20) 17:50:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$kcm(0xa, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x3, 0x5, 0x1, 0x0, 0x4, 0x8800, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x7}, 0x8000, 0x3a50a831, 0x1000, 0x2, 0x7}, r2, 0xb, 0xffffffffffffffff, 0x6bed17d40113adad) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xa, &(0x7f0000000400)=r2, 0x4) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0xfffffffa}, 0x8) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) openat$cgroup_int(r3, &(0x7f0000000240)='memory.max\x00', 0x2, 0x0) 17:50:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140900003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400000f3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$kcm(0xa, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x3, 0x5, 0x1, 0x0, 0x4, 0x8800, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x7}, 0x8000, 0x3a50a831, 0x1000, 0x2, 0x7}, r2, 0xb, 0xffffffffffffffff, 0x6bed17d40113adad) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xa, &(0x7f0000000400)=r2, 0x4) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0xfffffffa}, 0x8) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) openat$cgroup_int(r3, &(0x7f0000000240)='memory.max\x00', 0x2, 0x0) 17:50:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140e00003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:26 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040), &(0x7f0000000380)=""/218}, 0x20) 17:50:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0xe, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000603a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140f00003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) recvmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@qipcrtr, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/40, 0x28}], 0x1, &(0x7f0000000180)=""/169, 0xa9}, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000000002000000000000014d646aec8b159b6e4ce3fd42bd740500000008000022f91ee308e8b3f686f4845ac6429a04cd9c00000000000200dac01dffc53766b9c29400"], &(0x7f0000000340)=""/142, 0x4e, 0x8e, 0x8}, 0x20) 17:50:27 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040), &(0x7f0000000380)=""/218}, 0x20) 17:50:27 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) [ 480.225986][T19284] BPF:Invalid section offset 17:50:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140004703a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="146000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) [ 480.308581][T19284] BPF:Invalid section offset 17:50:27 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001280)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c00095000000000000002ba728041598d6fbd30cb599e83d24bd8137a3aa81d36bb3019c13bd2321af3cf1a54f26fb0b71d0e6adfefcf1d8f7faf769fb5e0f226bd917487960717142fa9ea43123751c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda903634e369a9e152ddca64057ff3c4744aeaccd0300000000000000a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e3888ee5c867ddd58211d6ece1ccb06000000e207d2f73902ebcfcf49822775985bf31b715f5888b24efa0000000000000000000000000000000000000000ddffffff020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab3323aa9fdfb52faf9cb09c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f0300f41ab11f12fb1e0a494034007de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b540500a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf112874ec309baed051d6fe048ba6866adebab53168770a71ad901ace383e418ef96c15b9a914dd1f7a2591dbe4a912ffaf6f658f3f9cd16286744f83a83f138f8f92efd92239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a447483cac394c7bbdcd0e3b1c39b6e0c410ade7a36b2635d60916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bdaba71f897144910fe050038ec9e47de8929a5457870eb30d211e23ccc8e06dddeb61799257ab55ff413c86ba9affb12ec757c7234c270246c878d01160e6c07bf6cf8809c3a0d062357ba2515567230ad1e1f4933545fc3c741374211663f6b63b1dd044dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e14e373732fff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2ecf63016c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e07869bba7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a8400e378a9b15bc20f3de298727340e87cdefb40e56e9cfad973347d0de7ba4754ff231a1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd07ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9cd920c2d2af8c5e13d52c83ac3fa7c3ae6c08384865b66d2b4dcb5dd9cba16b62040bf8702ae12c77e6e34991af603e3856a346cf7f9fe0bc9f2a1a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c010000000000000048a9dea00000b91d2309dc7ae49e4d5f52053a39e7307c09ff3ac3e820b01c57dd74d4aafc4c383a17bc1de5347bb71ca165cbbbaa2935f602327484386b21b96492ae662082b56cf666e63a757c0ef3ea7af6881513be94b362e15ffca8ec453b3a2a67aedc00b5b7e6d74b68baf37080ee49a56ded62afd9ced4853db4444f7ce439bff574bc000000000000000000000000000000000000000000ff0f000000000000000000000000ba38c42407a0eac060c4225e640e818abccfc8e3"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000004d40)={0x0, 0x0, &(0x7f0000003ac0)=[{&(0x7f0000002840)="4b9a47b66bb7f1ba04a2aefd6059c396db0e3c8767e1fb6e5d174fa367a798828a45eced9e54b46fcb4deb35b84b844dfec821dfccdb4267ec13bf94d7d938424dee7155116b3e32d92870ba2132f0fc0fee732cf4994f409715897c25cf9cba738017d4e0e9bfee", 0x68}, {&(0x7f00000028c0)="a7c0e78984e281c3548211862a92b76d43075f2850729c91473bd4a13c53d56cc857627f1b812b8896e3283ef64298f90aba48aa54f423225eaf82dc29ea614e05b4f1ca66818a0d959617497a45bbe762f568a761e20d3672590f8889a70c8c466f0f650ea55da8273515c6a92c8ec3c492111b6d11f7bb26b77df811556cee7bacc9272d394ffa80cd05", 0x8b}, {&(0x7f0000002980)="cad63d13d84d713abdf497d2b64a561c63e22422957c21282ec6325b09627282db333eda5195df4f374b5aeb66f65e79b29da207de438257d420a9622af57d2e7d9d222d09ab0b82af00b698790d19a1541ad7d3c503d85d70723deeef7f8cf702a03d60748f0297efa396eca300b1dde6b7454b0b4a098fb8e2b448b0fd36fa8392a19028e07c690728026b30e04e253583d23741f610e64378a06fb2c87efddc6473cfee476122502cd2a2463744bad2e7c9eab49f3d56d9b720f8088ab4f78e11a3b61e931f49a3174e0961ea122b8025e3be1c3dde026bb3722edecf28e450c6c50a931706f965bd6c499479d52ab64a928d756f1443446b3be936d2658b7de23ab1400f98a2042954437bf5b525c2e2d163cb58ee4b2ef528be9a125b258f57afad205fbcb57cb3ff478660561a3a00ebb885348ccc4c8597e67c1628e06857342ff3c63e5d8c207d84ae87a31e1f74d05646a69aa28c1204b9b67d026ece392c28ec2d4e73a427def4e0a9832ea6000096240a6a10d4770b77e7125dc92d8a1eece48ed44e7ca68109fc1fc984e5b94bec1476df458ae6f4ddae97cc62e5ca5aab708444fe57998a0caee4a2a66d9685a5c0ea5650967c216cf187ce5a444e0c99866e13bd6eae980ab8f6a0c98236d18a3fa375a00cf8995f8f8c7cc998c32c43e76cb07b94b2ef47cf1a23fd50181d2789af983181fca195878bbc6d23c005db38ca643765a31bbec65fbcc6d982962b7ba79122af9ac06c8cf53a710d25d7390b2c3bfc81a14f384623ba68b2d5c7be132f04195da4e8150d308de5ddff93fcd4f3468488723d14df8e6c95cee404fe5620ff8d580cee829b30f06ef55c87a8a3b7e0579624e5ba040d996650f35cc1a40e567d39d782e756522c5f61e4db512c0459a15b2e63716e458b1067cf91fd3067e5a96e2609abfe7a4e462107e7549720f88e46417f6eebc838207cbc9d1faf48e2b5719488798b3adba547aaf7fa35c28246f32c69c46ca364b511899917e490fecca022f64808eff1235c23c6fa6bbc0d7dc90f63ca40deb1b24c6bfb6e39f752f3f43522a10f4e17ff62c4e80c6febd1e85e539fe7cccc458e55edaab97b75213eef869b23487a564bd77c38b5bf9bf13439fea321569f20ba96f1e3f377ea2fa6aff4cf2d086f080a2e77e05bd51a286ad7caed7c8ee25a4330708d086be8368befc35c73e64419e9770896440defc204b6ad5069775156b251c6c0520192030f4dbfe27fcd5f3228be00a17d2061c3d230391e0948ad6d67604d9d6186b9d0a627f315df889726f4689bfe84c36ec572caebaab733a2986ebaf25e2dfa32c385a14afb35ebee36075aa9e48a4dfdbb87dc4f8968220f6881a547411c049fd356bdffa451d6ca6d913f30767da5b8de7b73212cf368d173d7dda70fdb714a019864beed12610c40977ca6176bf37ef5aa8d7e41d085b1f58596e869a9f6c53b67647fc0916f9b268add618731288e338fec8790541ae844d982a9067858343cfe2cd35d33add368b97ec334ca602766c3599e3b9f482c6d59234c9f690a6d4baa67785f75074b507e04354bc6d2d0209c2e0a8122d3a30bf26c0d3411ec9f11729f7619dd5eb2c263d82800cb7e3c8e85b09df829a287c7e5fd85bfb4ac257b2176194e2c39d5934a66f3497154cd3d59196408f56ef42cf4d86c9a55a5c3fb1d7eb86e46e723118ecb419a01e5db8a5aa98605ff42845487fbb66a8998a37bf55e5f36e0bb4e6fca6681996e205e412f852070139762dbd460d12da6e58b624da17ccd2b6db71895dfc4fca7fc69d947d9e32cd9da9a2dbd5319c6c6b3d633663e15f7cd0b61563c308de29f6c780c2f94cd442d34d351381376796bc1275ad4b2e3d099440c0ca0fc49a4713465b2060e909d9e125f85b52479326ec2b31a5af97b404aee602ccf1d0c580e55dc56aafd06602c424ddaa56bafefc63cf30e0f22ca2ec99c29eee36fa5c3f3adddd44a704398707c7f6d5854bb1c77b5aee23d7980cb0098aa92f65cdee095cfd58f52eb6496dd0f9319c3baf4fcb55a8b592d1c75d7ef3a87dea3fd6eb1a84468c7b2cbcf22e6973dd662558b939b93e8ead8198c05d25f75ad12889c338bea5c76ac2e7d687f8d28b6cf1703e22028f10468229a00f8aabd5744705f55f115aafd2c384b3300ce0625d3873df2f7dabfef7a91d41917c710a1886638a413c46f5d0fb5c77e1add73e3fc8472aae63e3fcfc92e381f1bf7a26591688af41f24a0a2cdf5ded6386bb7e3e9480c2415bc36fd16c4fba3ffaa53f6015b3ce425ecb75da8d83a4cc5fce3e5c2b787b54fd49143ba2abe97cfc869d7b707f2e017547083fa97b31f48b2e102708c761d1b28e9dc011ece764643e438eb1b89867d9f1b723cdcb41f132c0603b642fc47eb031b7ff7cb4bda9e285f121df806bbce867a2788379e97aa92457a4bb132809e4756da6629e4ac809859a1ae8b555612d8226d9a7511b6a859265aab984751e0b1667dedc57ca9a25421731dc3617537ee654a1ecc2a906eedd7b12fb00ab4fbb410c77be5a7911a24df94f014223fd8d26419990196d35c9c1c989d3fd1c13cb63f64bb6eeca839694c3e497d1de0cb45806e54e99f4bb67ed376c5629630d9aa86ee434ac30943ef834dc2ae44b4217f967dd7f9f1d47d99d8104a1b220298fb1f1e9cbdd0085827532016509a2621c8e0c1d8886eebcca319a1eb2e805ea23eaf4435dd674d6354be82ffba31e85281daefea92bc6c88a6c8995d644df74830ba766bb81cff0e7358d521c29b0a9dc759c57dfd2b781ceb02057dcce8ccf7c2948a4a52666834d48129e9f074252d7c1ba04ba9c25528ff06b1f56aa8cd0cc1ba5fe71a40114f53eb1db78978dd20b640b868515b59b8366ee42e11bf17cfc247936793a419caf5cc7baf9e62b3f9637cc3924a078d2858fa42e97ba8bed3c1bd3c3325066933d1492f2039735dac982ceb9239d76b35621f1c554d603e08bc4ae891efea98f673d517e725b8884584a7b3278f7dc4d7491556d400a13b8ee06e100fab12099c8e3b607783c035c607592fd4643bebe5cb0a4fa488fa81656197aaf010a78ae26f08aa0a75239f8243e17d3a14b3a0b81b38a7ca0bde46a5887ef0b4e535bb17dc9ccaf59a4973e3008e624fa604e2fcf2581a8da878eadf2e0b14ef3b95fb4085c3ba0c70adff2167468e21fe71ae1a15d7f2b6600e904e17581dbf192008980d38f1cd7ff1256c2833f63c9c3a533e5557a160b3d063e03b363783b42bfa8218488cdc34cc8e9d4aeacfca062a4eac106f172de11e00fa4f3de3ec77f7882682f9a8ce3fd2bb96f52e57b244dcafc25a2cf4c7688a530e121519b10fe279c056d53cdfb6c3972c6e0768b5bb7f5885cd2505c7f2dab33d564b2398ce2098e8b7de066bf63f790df3fa0712a67f6ea5b827d89f4945fcec066c159dc00c7555320954cdc269c5c6e5cfec938f5b5e08b6e5ce0ca1a6fd49093124c8fd1ef7903b68fb560ebf00c53b0655eaa5bab354efede7e6189ce16f031e2a2020ae5c094f126f6b27cf9ab2c0efe39d5e27619f5927afe88cce503ed1ab7b6c894bd503d997d6ace7486111290742af7b86a9ae61a796561b763a55269e9eae589b49c6962b7864fbbe6e2b3901b335af2c48e5851ec558c400c45131d43522306e5f222d395908a2074c7d16f0898daecc20872c34ef13760cde7c51541672f2562c02ad77e37d4045ab0a4fcb7e6b0d689bb02e3b044e9fce935a74016ffb59d54a4e5249d4a32aa5d317b919de6e9f5b49f1e3fac78213b5123acb302d2d190fb240eee7471112a6f19519f1fe4e752c42d7744e5fa22e00728210ce60db7e2851d1decdcdf3c52aeb81f1bc58b445c1f541a6913dfbf7494ee1344b1501fdae56419050646aa64d63e8c832f28f5b0b9428139fb7f765a834fb4a6adff345e90ad0a80432250b2c5193204fe590202a03f13b8162e28b2dede9901abb28e4369e854b2c9d309f8e5a3ae489ed44b33a983b1fb1b820dce69e9c364ef1efcaab6ccea93f2a3606c4222b97c0f53494df8974fa20efba17325564d533b0a2adb7652dc01d016f049c7906b04790b2ad469581594fd7974ea425e740864f329707ebb4f8bb18381b2d6bdd4543cc7526a8825abe6977b5c22b9f23549d0656652781ccea8bc80654cf4b076922e2720ac8d10c6ce3afaf9c66b404ab33a30e31efed99adb12e1665c52de08a79841c5bd6ad1ff6e395bfce786742cc145427d4deaaad1facfd343a705741db3c5dbb806c540e6868efaeafa33a6955ddd0b39bd160c732686c7a602a6f1acb36fe6f4fa3f1c0b67611d4cb08755ac54417e2ae18bb3f5937d770a18bf328efe60461e3978b8e723212b5cd80fd5d580ea90df31044e74e8f1ce0f077985e8c19eb4f172c4ac6f65928b7055603f3d6132d7f7f69e2620cd0ccd60278447f6b18e22b295766c6d557741ce53ef2a0a54ef6e94ef70d2bacd2b3d356bccf5fe8f4bcfe5fdfed70d2be14dd39df7e9db17a65fde485cbb093177119bd0ea8b614dd2ab52385afad00da9f3f13334c9c5c7f95d5c836cb7f845060eff5487003d02a9fb076cc9f1cd4b100cde4f920a1e2f974ddf2a5240069cb86bf65a190205cab82f4821ecf8da7e72e11e94daa2272086977cb33ac43f6b07a0255a139545b542b45e0dda9d515920a9b7bd3ac7fe82c127c97a174cf8d846ad6feb78966171ef95da4a45961d19732cebaf06c277405e7021039d91bded79db9033069c5904b9d041988395886068682882473e3c86c0c303821fdf2ca287e33e356ea2343bca34daa835a1ee36fb25704f062d4992641c762c7ddb1f3728813ab4079d6299293aa24e6322ddd65f290b9f45905add9e487aaccad96b0fdf41aa15b0a165da7aefadd6dfac5d083d1894c12727ee9c480d86d88b370cb0249a3db8d39fce4ec32431c5eb724ce5be7af931a2fb08a1f5d36b7628197d7ece91bfa50d665e5af6f9b857400e269e08148ea05c5e5bd6301e81c04eaba1970ee83e035541445547b743f9d401926a56017680aa6e587fe625c35cd77568644a87061a8b337f86d496d5245c16bb32244394f65f9567b6c45ce3b4e51780dcecb6d3f12324864d2c1686e64484284ce864c5d3e9abea260fe39d6794f6cc0f380e7acf73e3e19c7dc5cd42ae1b469dbfd493c59b1b0685a9f516565c2b455bbdf54e3f81952ba9e88245fed5650e406285594a99ed1e4d2a087ba68ce81bcfa45e3075252e51e9929fbb4f492a4f0d8b4fa71a54fe1298a272e63c0d007959c5ad4019091de96ccefaa2fd34f88c73f1f2fe2cd2dde4adad6803a298964f6822f3d6b637a17a5471ebc16a5d25455ebc923fb79ed87df4aac5321502493fadbfa3e5793bbd9c2e819256dccb2eb94b8af01b62cd1b093db2a44aa0a1dc4698795555fd90d760f26afd829d4e94b0887118d69814996306d4a3b1377452a3639e2a9dbdf865601fd60c8ec0adcf8603cdfb5baea35a451cd498c9c1aa73ef2fed0dbed9792f513cea6de177f4f65fecb8ffbba5977276b2b4373fd49fa6f39d4b1fb01c6c0c9ce61b843f5bfc6934b88899a44501f8e58a2a0985d3808342881bf2c86fe6e2e1d82d7b90ff4c05587437cce077a351b512bca611db1e75dcd6e0c98515cc8929dcdd8d1b1bedeb47648f45ec564652b05d89451720d8542fb5053ca6f5ba35671de85fa676d5767cae912e932c46828f189cec888c33c82514a066b", 0x1000}, {&(0x7f0000003980)}, {&(0x7f00000039c0)="4589c11c16f517cc644651ca11a59d43c086ae213c7dedde5c8a8ff028b69dc61f46a2622fec205137296f8e8a98966c5d673aab6cc138f2a20bdd40e62e45a009d0b0135aaf0bb782cdaea0c444b903e57cccd7c4f5694ebfc0ea0efe7bf8cc42892adc33cee4521539e5947c19f4752bdbac8ed6d5a9a73cf0a46e907095b49996b9beb4ad917d0d0161fb1c3b", 0x8e}, {&(0x7f0000003a80)="f3924737d36217f5c8ad76988360190a0efda67b8d02aece1d6a20bd118f1cbcad335f608149082a29c646b94fe22d", 0x2f}], 0x6, &(0x7f0000003b40)=[{0x80, 0x14, 0x0, "569cd857deb720c98dfcf43fc85d694824a5e8730d2d88291265406236ee13610fcc193c85aa87c11a8582bc1b682c5a06447710cee8b9d556bda8499123ab9171a066d6e3a8a8728deef05afda904bd0c0e3e57bccf739173465a702cc7266e4f8fa28ce9a62fe0b429730c0dffc2"}, {0x40, 0x10c, 0x10000, "21d5a7548a05f5da606a7a872cd22953487fc259ad185075ecbbbf92562310ec9347a09d5679a77512f3"}, {0x1010, 0x115, 0x4000000, "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"}, {0x20, 0x116, 0x1, "8670f919f2a6675a46"}, {0xf0, 0x111, 0x6, "bfac456868be9f7c7dc41d7a282177e5b4daf445e485a31f3db6243ff35970e3dd57a06fef3436a8f41cdc0dab9dc202203e54675a08d39e907a876444386640b085d97d3d982df5df4e16e687f36ba4615421aef8a2ed91576b26e08b9e3c3394e0762b4515e18d6e7ca18d4074029ac7894ff234fc3a1ecb963602af26bc7cfa2029025d2645a275ef8dcce94538910b01a1fc6f43263b371582abe62746a1e73d14f4e136fd374746259610d0bd7c9959559097dabdd1eb2c56b45cc5889bab0bc46f5aa0e51ce7363941abf69f00cdb5bc7617f9d8d20de482f5bb0a"}], 0x11e0}, 0x40000) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000240)="852217d97febb90a72e53725c8b00922b363afa39967", 0x16}, {&(0x7f0000000800)="417c64130e07eefc5c5debb616759732d36fac4102e75c886a59a12c19ba4fe61216f06f8025a035de70f0205e9665df4af29a8ff0bf3d8552fd1c6ac6b88f7f0ec4889c892ced75ef899e3bb3f6c4ffc73bea1012b83c7842adcef1789cb85c0159b637c7f600e9505cb5e9422c5aa854f10073a011c3a18848c68cb2c7164db9ca7e4f99c77dd88265dfa7237ba64c7106f4f83ff0977d1fa3d8bffc6d800fdd79b52a1b15f2c7fabd2f3ef0cf6cf30329ba51e4819b753cd576814cc0", 0xbe}, {&(0x7f00000008c0)="e0f572f74fad9daa47af7cc1698637a6c3993f8cc2d3b8978f30d97d9dea6b143a1dc68e49a39a3498acafc8474ddfd5faf79224fb49de55fa17db55e905f2f9d4b7d74f62899a65cbb9c960e80759e077c5c6aa28aff1e551be6c2656400b54906d8bca0d95048f4ee5127b1872914fc5cbe17876a20ef805b594a9d17d4602525b529fef4c39a1058ebe4e9c5766310a0884a5bf361b5d9d9dc9f66cf235cce533ed6e35c8e9b6a9787cf4ef7bcaa7f73fe8496a7793238b7fe2cbde4161de20d3ba4dc9e829f132f21d7f19c4f917b949722f533c2a166250", 0xda}, {&(0x7f0000000ac0)="565613c6e0c13e214b5ec0baa7a554b7ea0f088d5476471bdb2a2eb380c46af1823e8f8e2b0e9cac5693a4ea4fc4e5b6ac1ec6754e4255f5926a12c9414b504a7f39a8817fbb39aba6dba04b86b6cd026cf2efc61a4e32bf0da9e529de5b647f2d242a3db4ea02a5e99283c2e8798a2fb7d9783689fc27cc47c2595b407510bee76e5ca7ffd2544ce83801e29ef09b", 0x8f}, {&(0x7f0000000b80)="bff0005416d8a0108f9737d649493833d3c64887a18efcc526d185a14db344637e281b0c5cc1a2b0e8449ff51c405a98e2951d178c94bb92794953b33e8e9ec6a4792636d4cbbd324258d6913744d58de09766bf0dea9f550314acde7830bd8c5378b0c3798a4f3a260e9cb9d50e99d2bda056d29e1dc82cb3b59e0302a68e1e92fed6f2797b998d0b8fab20410d13eb68bfc41b6c48042b86e49dc2f0c59ad72f8f01cb205f4ededb6a76018bfc0466e944c5e80ad3cd14d0f17165c7f696f1", 0xc0}, {&(0x7f0000000c40)="bfacd029c67f790b83244e124a6ca5f03664248707671567cf2ad173314ee48f986c9e1a2668fa4334391ddf92ba6da8814bd56af20a09d702df96f58e32f5e78c94270480c831bb1c8e856869fbdcb78e9dba72d5a93c46001d96280e2dca596c83eb6d51bf3dacda8a53a63d3835006a6ee55c077ca20eff", 0x79}], 0x6, &(0x7f00000009c0)}, 0x5) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000009c0)={0x80}, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x4000, &(0x7f0000000a00)=[{&(0x7f0000000280)="02", 0x140000}], 0x1, 0x0, 0x0, 0xe803}, 0x24002) sendmsg$inet(r2, &(0x7f0000000f80)={&(0x7f0000000d40)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000001200)=[{&(0x7f0000000d80)="0fbdd7bbe2a7a70d86e3db28b606c668a0322678f7024a4e9508893f10ce87f51b4ff51c1f32b7f53b46fde47620fd53f41d4daab7215eb8e0f72ee980261e5f3a0f5d1ad7c01b38513f4fb6bbe7d9d2c0ad1002bf79f32c45c231be11b7be29ebe63ca50809b0fe76de3f7cbb4c55284c5ed09e0fb1b120373b02a4cb4ee8891ffa78582f152aea4eab6358fe8797ab804bbb534ce2b55b116c7ef114a7b636", 0xa0}, {&(0x7f0000000e40)="1e74c1312836b5a8b562bc171ebdc693f6e2107ab01328748684832951765e4058e456671ac9e47b5fe4b8ffb4", 0x2d}, {&(0x7f0000000e80)="a9eb9b331b6d33751e69e05bf708f459f5e8fabb27105576ac35dfaaea2bb1c55760faddb1904d68b26f1c04be230fba7fd32afcc010e574a7a80d1543e5e44bb7524967b5f72639df3c62e43f995ebe7af0a7c6c3d9e543af4ead885d03b522b3bc750456120472b19a152400f9823bdfa88d13d7337a853a792c46606c4dfac5da9bdb8880566ad59a58aac9975b843f92c145148b93a00d2987b94a25f04d26eacdf2bad144f20f6e2db11c1ee34f113b88705df06001811ed7d10dd73144e4fd204b8e0fd6b3ca6e6557c17df37d0a38db7a21fa2c93e6eb57dcf0", 0xdd}, {&(0x7f0000001000)="e78c1d427dfda0a7b2bf3abef6b5b354c5ebc99c0fd817a83cb8409fb7d7dec83b359ce505d53cba249b2bb91c4bc4f10b744408b606da84355c16bbe64aae32912be9642a0c6c5df24f43de880ec5ecd6ffbcc11ced15ef4cea25950e3dbd031192d81b402be032f5d0135fbfeebb099e63cc289d65f0be9598e5b89335111e9d29bbf7798a9dd683641c98de897880fe79e171962b4c2b3c0219aa95f4d4dd3fa594d23b1998cabcbd85cc561e4408dd6d81a9626c5c7e21db61c14afbbdd37c41dc10db1c14d3b1dcb17dd4991b0c6d59a1c2", 0xd4}, {&(0x7f0000001100)="2869306c80a53a6c8d0732994051551f4a81a83c360b1c354c1ca418599dce5e8c6eb24737176f8df63c842c07c0e32beba49eaa81c8d7918fddf13c1bb95b3c1d63fe15630b55855263769ce9d44adbbc748ba0c9bfb14f36f850608734b03895b8ac32d7396807173eed29a01a2384cb99dd134dc52878cda6535d119bdfb422c0af66629c4fa2bbcfe67a6cd545629c73cf14760c6d7d16e868f9f3e425a73f17adcfc8fba3cb65f43a97e796d0db0f2876f3ddc1888f060797e5e207ce014a0b620e06c38f4ed0e0f9569201", 0xce}], 0x5}, 0x20080080) 17:50:27 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:27 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551", &(0x7f0000000380)=""/218}, 0x20) 17:50:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000f03a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0xf, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="14f000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:28 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000000f000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:28 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551", &(0x7f0000000380)=""/218}, 0x20) 17:50:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000023a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="14be02003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:28 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:28 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551", &(0x7f0000000380)=""/218}, 0x20) 17:50:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140003003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000033a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x10, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140009003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:29 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000043a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:29 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc31", &(0x7f0000000380)=""/218}, 0x20) 17:50:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000083a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="14000e003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:29 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc31", &(0x7f0000000380)=""/218}, 0x20) 17:50:29 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000093a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x11, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="14000f003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400000e3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:30 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:30 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc31", &(0x7f0000000380)=""/218}, 0x20) 17:50:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400000f3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140060003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:30 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c", &(0x7f0000000380)=""/218}, 0x20) 17:50:30 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000603a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x12, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1402be003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003f000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:31 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c", &(0x7f0000000380)=""/218}, 0x20) 17:50:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400f0003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000000f000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:31 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c", &(0x7f0000000380)=""/218}, 0x20) 17:50:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003f000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x13, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a020511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:32 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140002003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:32 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a937", &(0x7f0000000380)=""/218}, 0x20) 17:50:32 executing program 0: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x401c5820, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, r1, 0x0, 0x0, 0x0}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000061120000000000009500000000000000874177777a3f3ac1dedc26cecd6129e0cb958216aecf9f72a64f8cda618d51fd09d9bb2139e457432ada42812e08eebb000000000000000953652849adec8bff40d0c3899bbb0e3fdcf711db085521940fae1830e1b933466483b421f972b01dce2b284b65ec847630ac3dc7fd074dc77e1b3cf1dd0a78c6a87ef98cb1e04c72bd6a12aa77ce9ec745f0bf4ef94233a64faa91f5e944b15eb551c6e3a22cb16f"], &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0xfffffffffffffff6, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r2, r3, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup=r2, 0xffffffffffffffff, 0x2}, 0x10) r4 = openat$cgroup_ro(r2, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000380)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000085a800009f01c6826748bfc0e18daa4ed8ef57d6a8bcae93537f525962b22070efb6825ef8eb608630f843ad7d1d9f134dad80c152c79fec1c053f4d303d0910a748b42797d189ff74fb9600928f23bba96f07927661543dd2f01034a8cae3daaf7208bae79d2ec2ac60a7935e5622418a8a94c7698d0dd29ac4fa129a994b9edc286bf08169a12e4b1fa086bd"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r5, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r6}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/179, 0xb3, r6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r7, 0x4) 17:50:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140003003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a030511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:32 executing program 0: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x401c5820, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, r1, 0x0, 0x0, 0x0}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000061120000000000009500000000000000874177777a3f3ac1dedc26cecd6129e0cb958216aecf9f72a64f8cda618d51fd09d9bb2139e457432ada42812e08eebb000000000000000953652849adec8bff40d0c3899bbb0e3fdcf711db085521940fae1830e1b933466483b421f972b01dce2b284b65ec847630ac3dc7fd074dc77e1b3cf1dd0a78c6a87ef98cb1e04c72bd6a12aa77ce9ec745f0bf4ef94233a64faa91f5e944b15eb551c6e3a22cb16f"], &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0xfffffffffffffff6, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r2, r3, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup=r2, 0xffffffffffffffff, 0x2}, 0x10) r4 = openat$cgroup_ro(r2, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000380)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000085a800009f01c6826748bfc0e18daa4ed8ef57d6a8bcae93537f525962b22070efb6825ef8eb608630f843ad7d1d9f134dad80c152c79fec1c053f4d303d0910a748b42797d189ff74fb9600928f23bba96f07927661543dd2f01034a8cae3daaf7208bae79d2ec2ac60a7935e5622418a8a94c7698d0dd29ac4fa129a994b9edc286bf08169a12e4b1fa086bd"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r5, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r6}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/179, 0xb3, r6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r7, 0x4) 17:50:32 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a937", &(0x7f0000000380)=""/218}, 0x20) 17:50:32 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a040511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x14, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140004003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x29, 0x6, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040), 0x10) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000380)=""/25, 0x19}, 0x60) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffeca, 0x0, 0x0, 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x942614271ecad7f9) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002680)={0xffffffffffffffff, 0x0, 0x5b, 0x78, &(0x7f0000001500)="cdc47030e99c083291fef33776e4f6f0153692d1c13d54d01715f5b00f4df35aa60fb944eebb6fc9bf2cfcf33720dab02095592edd9dffdd78363bad3c16b7995b64ec0264ef3dc5f1bed0441f83fb02cc9de89d02c045198dbff7", &(0x7f0000001580)=""/120, 0x80000001, 0x0, 0x1000, 0x42, &(0x7f0000001600)="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", &(0x7f0000002600)="8b2b6a0273bcfdc523af778f2339332c88cd231c923f3fe891e19301a9b0e7dfc0558ffa84ad4b9e8f918be3e2b18ca15ca0732c34f19945dfebfd927b91665ea339"}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000014c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xdf03}, [@exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x7, [], 0x0, 0x0, r4, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:50:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a080511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:33 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a937", &(0x7f0000000380)=""/218}, 0x20) 17:50:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140008003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a090511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000003f80)='cgroup.type\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="1c00000026000511d25a80648c63940d0124fc60100035400a74db43", 0x1c}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x19, &(0x7f00000001c0), &(0x7f0000000240)=""/25, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}, 0x40) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000ac0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6L\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000280)=""/183) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000080)) 17:50:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0xfffffffffffffecb) 17:50:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a0e0511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:33 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9", &(0x7f0000000380)=""/218}, 0x20) [ 486.580237][T19540] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x15, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140009003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a0f0511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:34 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0xfffffffffffffecb) 17:50:34 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fe) sendmsg$kcm(r0, &(0x7f0000001680)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x3, @remote}}, 0x80, &(0x7f0000001540)=[{&(0x7f00000001c0)="7a6adb63036e8c3d171486f48ab8026d695dc484a7298be1602e42a27e40d4d0ac5e8e60d651ea8df8e726766c29c0151e93ce0f92281d8deccc49242fb8e3c79b931b794219bbaacf3b0bfd817a77ec4d171f18fd48a24d01fd2af49d6da98e4822bad398ad9607178f4d6d25b235b6db0c3824033ff10fd362a0d09b5d4d45c53cd2dd093f3cfa0da411ac5bf0a58d7ec735474313600cfe4e55c504bd3d7d33a1d57074c4f14e0beb45e8227da6775f2ea476ea498c8373eb31cb2c2057adb4709391dd21a3ea8c6690780639422a10257b2d20e0b34914e6cf4589fa61d32b8eb62fe18c", 0xe6}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000000)="c374cfe47c8815deb6aadd56ad3baa77197b91b75f83fef0030ad02becf9f09caae55409f283c9ce", 0x28}, {&(0x7f0000000100)}, {&(0x7f00000012c0)="98ee7d4020f389bb1d5a4fbb3e3f2f8530d7879926494459c3c26d60843e0ed0c618f605cc01ef9b982b7932b2536e1fa77c993c335ff49d1270729867e5b728a20cefe2fecb95a58af4dd6a4426cee66a", 0x51}, {&(0x7f0000000140)="35ec3201", 0x4}, {&(0x7f0000000100)="d4d849", 0x3}, {&(0x7f0000001380)="a059b53c673e94665a2a78320e4df7e4cf59a16bdfa4f892edab7013356d3aab72e6a403178e4fda03be3155893b8006b7bc87a802b59e3dd638669c6360f4d261fb184ff9777c9828b848a5a38a58e100615a2af7436a61ddc28ebdcaf5e6e67ee13289a841dac723f7db2171d5d651dd0823223e7a257bb9e12e97fbacd837ef7c5002438e298eb35aac2b72f623efb151847347ba84248c41dcec2ae83d52cf128bbd89bff262ff2875396b82c2d1cf2f95a3fc4b5787b7c19265a3a31e1aedd3e4e331ee4d2fa849014b52fa97", 0xcf}, {&(0x7f0000001480)="81fb318b2453d681371e9fbeedf120", 0xf}, {&(0x7f00000016c0)="9c2e5baddf18c6a11d1c4c40016b8558fe8da2199d6d664ddeac7f7f6efeec46b91702d2c6acc13e2718762a00b5b1d00b44240d9543942c8686b683481f5da5764f166bd59e4c6815936a9ead2969aedb23ea404598b847f10edb04b04585866d035b5c95881a491411d4dbd3e02da53f8ac22ad645cd3f2aab92bad75cc07dd8cf159659b3156ad54586ffac29a8a8d3ff0029fd8ce9eaa751c78442efcaaae6e1bd85dfbfa520de77ad14cda100000000000000", 0xb5}], 0xa, &(0x7f0000001600)=[{0x38, 0x1, 0x9, "79767a4e4a1166877696410f664e2575fdf72a9e8896c43e7270016762615cfb7d7d52bd9b"}, {0x18, 0x84, 0xd8, "e30a"}], 0x50}, 0xc4) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, 0x0}, 0x200408c4) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) 17:50:34 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9", &(0x7f0000000380)=""/218}, 0x20) 17:50:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a600511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0xfffffffe, 0x9, 0x400000000000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2c, 0x3, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000003400)={0x3, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x5, [], 0x0, 0xffffffffffffffff, 0x5}, 0x40) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000000)='&@[\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="8801513ad9bd273105de87d336d7d99c4dd81c6d3b8955723b559630c061723868adf0edc92f49beeb72c65e2d51e2a82ed823de91468cec1636933dc45df6f8bddeb7b36298cc6399140c691abdc3c3a03274751a605edc72a6ec47d1bd611824c00ed4f29aa714383df992088caff1a82761a6edc1d334c76d5f1da4b3d1661b8ed4fd12be39ab6a32d5116f3bc75601c0dc6b2192b184b9fd597458db924ba7b2ffdd536cedaa62d7dc9c501f49d4abb524d381dd3b24668b68792b592cb01bb3275a643bc87bb1dfcf43155082802c1a82fc6c397a7093b8fc5abba55358506a48f90cda29b6"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000680)='&@[\x00') 17:50:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="14000e003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:34 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0xfffffffffffffecb) 17:50:34 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9", &(0x7f0000000380)=""/218}, 0x20) 17:50:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0224fc60", 0x14}], 0x1}, 0x0) 17:50:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x16, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="14000f003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:35 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d03c0fc60", 0x14}], 0x1}, 0x0) 17:50:35 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", 0x0}, 0x20) 17:50:35 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0xfffffffffffffecb) 17:50:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140060003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0xf}], 0x1}, 0x0) 17:50:35 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0xfffffffffffffecb) 17:50:35 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:35 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", 0x0}, 0x20) 17:50:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400f0003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400be023a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0xc0}], 0x1}, 0x0) 17:50:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x17, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:36 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", 0x0}, 0x20) 17:50:36 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff7f}, 0xc47, 0x7f, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000340)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000540)=""/179, 0xb3}, {&(0x7f0000000000)=""/45, 0x2d}, {&(0x7f0000000600)=""/248, 0xf8}, {&(0x7f0000000280)=""/15, 0xf}, {&(0x7f00000003c0)=""/7, 0x7}, {&(0x7f0000000700)=""/237, 0xed}], 0x6, &(0x7f0000000900)=""/100, 0x64}, 0x40002003) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000200)=""/94) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e74000026000511d25a80648c63940d0424fc60100016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r2, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002700)=""/245, 0xf5}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x11, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="00000000000000008559c0fe000000009da50000d91da4051800000000000000150000", @ANYRES16, @ANYBLOB="0000000014000000186739e8622801000b83e85dd968000000ff0f6f1138792e6aa04306001a2a0000", @ANYRES16=r2, @ANYRES64], &(0x7f0000000840)='GPL\x00', 0x800, 0x0, 0x0, 0x40f00, 0xc, [], 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0xf, 0x2, 0x800}, 0x10}, 0x78) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff, 0x2, 0x10}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 17:50:36 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) [ 489.153525][T19648] netlink: 'syz-executor.0': attribute type 22 has an invalid length. [ 489.182356][T19648] netlink: 29694 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0xec0}], 0x1}, 0x0) 17:50:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000033a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:36 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:36 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x33fe0}], 0x1}, 0x0) [ 489.437965][T19652] netlink: 'syz-executor.0': attribute type 22 has an invalid length. [ 489.463553][T19652] netlink: 29694 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000093a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:36 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:36 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:36 executing program 0 (fault-call:6 fault-nth:0): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) [ 489.877158][T19696] FAULT_INJECTION: forcing a failure. [ 489.877158][T19696] name failslab, interval 1, probability 0, space 0, times 0 [ 489.905269][T19696] CPU: 1 PID: 19696 Comm: syz-executor.0 Not tainted 5.9.0-rc3-syzkaller #0 [ 489.913985][T19696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.924030][T19696] Call Trace: [ 489.927321][T19696] dump_stack+0x198/0x1fd [ 489.931650][T19696] should_fail.cold+0x5/0x14 [ 489.936242][T19696] ? bpf_test_init.isra.0+0x9f/0x150 [ 489.941519][T19696] should_failslab+0x5/0xf [ 489.945927][T19696] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 489.951988][T19696] __kmalloc+0x6f/0x360 [ 489.956139][T19696] ? find_held_lock+0x2d/0x110 [ 489.960904][T19696] bpf_test_init.isra.0+0x9f/0x150 [ 489.966030][T19696] bpf_prog_test_run_skb+0x1ae/0x1c10 [ 489.971408][T19696] ? bpf_prog_test_run_tracing+0x330/0x330 [ 489.977212][T19696] ? fput_many+0x2f/0x1a0 [ 489.981556][T19696] ? bpf_prog_test_run_tracing+0x330/0x330 [ 489.987357][T19696] __do_sys_bpf+0x1770/0x4c60 [ 489.992030][T19696] ? vfs_write+0x397/0x730 [ 489.996445][T19696] ? bpf_link_get_from_fd+0x110/0x110 [ 490.001807][T19696] ? get_pid_task+0x138/0x200 [ 490.006482][T19696] ? __mutex_unlock_slowpath+0xe2/0x610 [ 490.012021][T19696] ? lock_is_held_type+0xbb/0xf0 [ 490.016952][T19696] ? wait_for_completion+0x260/0x260 [ 490.022249][T19696] ? check_preemption_disabled+0x50/0x130 [ 490.027962][T19696] ? syscall_enter_from_user_mode+0x20/0x290 [ 490.033953][T19696] ? lockdep_hardirqs_on+0x53/0x100 [ 490.039146][T19696] do_syscall_64+0x2d/0x70 [ 490.043568][T19696] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 490.049460][T19696] RIP: 0033:0x45e179 [ 490.053350][T19696] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.072957][T19696] RSP: 002b:00007f1b8034fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 490.081357][T19696] RAX: ffffffffffffffda RBX: 0000000000001780 RCX: 000000000045e179 [ 490.089316][T19696] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 490.097275][T19696] RBP: 00007f1b8034fca0 R08: 0000000000000000 R09: 0000000000000000 [ 490.105238][T19696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 490.113207][T19696] R13: 00007ffe1d136f3f R14: 00007f1b803509c0 R15: 000000000118cf4c 17:50:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x18, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x200001d4}], 0x1}, 0x0) 17:50:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400000e3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:37 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:37 executing program 0 (fault-call:6 fault-nth:1): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x7ffff000}], 0x1}, 0x0) 17:50:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) [ 490.404931][T19713] FAULT_INJECTION: forcing a failure. [ 490.404931][T19713] name failslab, interval 1, probability 0, space 0, times 0 [ 490.436530][T19713] CPU: 1 PID: 19713 Comm: syz-executor.0 Not tainted 5.9.0-rc3-syzkaller #0 [ 490.445224][T19713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.455279][T19713] Call Trace: [ 490.458574][T19713] dump_stack+0x198/0x1fd [ 490.462911][T19713] should_fail.cold+0x5/0x14 [ 490.467506][T19713] should_failslab+0x5/0xf [ 490.471920][T19713] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 490.477989][T19713] kmem_cache_alloc_trace+0x49/0x300 [ 490.483280][T19713] ? bpf_test_init.isra.0+0x122/0x150 [ 490.488674][T19713] bpf_prog_test_run_skb+0x2ab/0x1c10 [ 490.494066][T19713] ? bpf_prog_test_run_tracing+0x330/0x330 [ 490.499877][T19713] ? fput_many+0x2f/0x1a0 [ 490.504215][T19713] ? bpf_prog_test_run_tracing+0x330/0x330 [ 490.510018][T19713] __do_sys_bpf+0x1770/0x4c60 [ 490.514692][T19713] ? vfs_write+0x397/0x730 [ 490.519118][T19713] ? bpf_link_get_from_fd+0x110/0x110 [ 490.524485][T19713] ? get_pid_task+0x138/0x200 [ 490.529168][T19713] ? __mutex_unlock_slowpath+0xe2/0x610 [ 490.534715][T19713] ? lock_is_held_type+0xbb/0xf0 [ 490.539658][T19713] ? wait_for_completion+0x260/0x260 [ 490.544958][T19713] ? check_preemption_disabled+0x50/0x130 [ 490.550676][T19713] ? syscall_enter_from_user_mode+0x20/0x290 [ 490.556662][T19713] ? lockdep_hardirqs_on+0x53/0x100 [ 490.561879][T19713] do_syscall_64+0x2d/0x70 [ 490.566297][T19713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 490.572185][T19713] RIP: 0033:0x45e179 [ 490.576081][T19713] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.595679][T19713] RSP: 002b:00007f1b8034fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 490.604088][T19713] RAX: ffffffffffffffda RBX: 0000000000001780 RCX: 000000000045e179 [ 490.612052][T19713] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 490.620014][T19713] RBP: 00007f1b8034fca0 R08: 0000000000000000 R09: 0000000000000000 [ 490.627980][T19713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.635942][T19713] R13: 00007ffe1d136f3f R14: 00007f1b803509c0 R15: 000000000118cf4c 17:50:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400000f3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0xfffffdef}], 0x1}, 0x0) 17:50:38 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x335843, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r1, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f0000002d00)="13", 0x1}], 0x15}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000000), 0x12) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) 17:50:38 executing program 0 (fault-call:6 fault-nth:2): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) [ 491.016391][T19730] FAULT_INJECTION: forcing a failure. [ 491.016391][T19730] name failslab, interval 1, probability 0, space 0, times 0 [ 491.059025][T19730] CPU: 0 PID: 19730 Comm: syz-executor.0 Not tainted 5.9.0-rc3-syzkaller #0 [ 491.067724][T19730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.077778][T19730] Call Trace: [ 491.081075][T19730] dump_stack+0x198/0x1fd [ 491.085424][T19730] should_fail.cold+0x5/0x14 [ 491.090032][T19730] should_failslab+0x5/0xf [ 491.094457][T19730] slab_pre_alloc_hook.constprop.0+0x3d/0x1f0 [ 491.100532][T19730] kmem_cache_alloc+0x46/0x3f0 [ 491.105313][T19730] __build_skb+0x21/0x60 [ 491.109560][T19730] build_skb+0x1c/0x190 [ 491.113729][T19730] bpf_prog_test_run_skb+0x30c/0x1c10 [ 491.119127][T19730] ? bpf_prog_test_run_tracing+0x330/0x330 [ 491.124946][T19730] ? fput_many+0x2f/0x1a0 [ 491.129295][T19730] ? bpf_prog_test_run_tracing+0x330/0x330 [ 491.135111][T19730] __do_sys_bpf+0x1770/0x4c60 [ 491.139797][T19730] ? vfs_write+0x397/0x730 [ 491.144236][T19730] ? bpf_link_get_from_fd+0x110/0x110 [ 491.149615][T19730] ? get_pid_task+0x138/0x200 [ 491.154306][T19730] ? __mutex_unlock_slowpath+0xe2/0x610 [ 491.159854][T19730] ? lock_is_held_type+0xbb/0xf0 [ 491.164800][T19730] ? wait_for_completion+0x260/0x260 [ 491.170104][T19730] ? check_preemption_disabled+0x50/0x130 [ 491.175831][T19730] ? syscall_enter_from_user_mode+0x20/0x290 [ 491.181844][T19730] ? lockdep_hardirqs_on+0x53/0x100 [ 491.187057][T19730] do_syscall_64+0x2d/0x70 [ 491.191477][T19730] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 491.197371][T19730] RIP: 0033:0x45e179 17:50:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x19, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000603a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:38 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x2}, 0x0) [ 491.201270][T19730] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.220875][T19730] RSP: 002b:00007f1b8034fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 491.229290][T19730] RAX: ffffffffffffffda RBX: 0000000000001780 RCX: 000000000045e179 [ 491.237263][T19730] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 491.245238][T19730] RBP: 00007f1b8034fca0 R08: 0000000000000000 R09: 0000000000000000 [ 491.253225][T19730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 491.261196][T19730] R13: 00007ffe1d136f3f R14: 00007f1b803509c0 R15: 000000000118cf4c 17:50:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140002be3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x3}, 0x0) 17:50:38 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x8a, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480), 0x10, 0xffffffffffffffff}, 0x78) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:50:38 executing program 0 (fault-call:6 fault-nth:3): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x8}, 0x0) 17:50:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000f03a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) [ 491.700052][T19756] FAULT_INJECTION: forcing a failure. [ 491.700052][T19756] name failslab, interval 1, probability 0, space 0, times 0 [ 491.712901][T19756] CPU: 1 PID: 19756 Comm: syz-executor.0 Not tainted 5.9.0-rc3-syzkaller #0 [ 491.721573][T19756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.731622][T19756] Call Trace: [ 491.734921][T19756] dump_stack+0x198/0x1fd [ 491.739262][T19756] should_fail.cold+0x5/0x14 [ 491.743859][T19756] should_failslab+0x5/0xf [ 491.748279][T19756] slab_pre_alloc_hook.constprop.0+0x3d/0x1f0 [ 491.754445][T19756] kmem_cache_alloc+0x46/0x3f0 [ 491.759210][T19756] skb_clone+0x14f/0x3c0 [ 491.763529][T19756] bpf_clone_redirect+0xaf/0x420 [ 491.768470][T19756] bpf_prog_5e3b4e18def6d727+0x5c/0x250 [ 491.774016][T19756] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 491.779991][T19756] ? build_skb+0x1c/0x190 [ 491.784328][T19756] ? bpf_prog_test_run_skb+0x30c/0x1c10 [ 491.789874][T19756] ? lock_is_held_type+0xbb/0xf0 [ 491.794806][T19756] ? find_held_lock+0x2d/0x110 [ 491.799565][T19756] ? ktime_get+0x3e/0x120 [ 491.803894][T19756] ? lock_downgrade+0x830/0x830 [ 491.808752][T19756] ? bpf_test_run+0x119/0xcf0 [ 491.813431][T19756] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 491.819925][T19756] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 491.825918][T19756] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 491.832417][T19756] ? lockdep_hardirqs_on+0x53/0x100 [ 491.837610][T19756] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 491.844104][T19756] ? read_seqcount_t_begin.constprop.0+0x133/0x1e0 [ 491.850611][T19756] ? ktime_get+0xd8/0x120 [ 491.854941][T19756] bpf_test_run+0x3be/0xcf0 [ 491.859443][T19756] ? __phys_addr+0x9a/0x110 [ 491.863984][T19756] ? eth_type_trans+0x360/0x690 [ 491.868847][T19756] ? bpf_test_finish.isra.0+0x270/0x270 [ 491.874386][T19756] ? __build_skb+0x53/0x60 [ 491.878800][T19756] bpf_prog_test_run_skb+0xa4c/0x1c10 [ 491.884174][T19756] ? bpf_prog_test_run_tracing+0x330/0x330 [ 491.889974][T19756] ? fput_many+0x2f/0x1a0 [ 491.894304][T19756] ? bpf_prog_test_run_tracing+0x330/0x330 [ 491.900101][T19756] __do_sys_bpf+0x1770/0x4c60 [ 491.904769][T19756] ? vfs_write+0x397/0x730 [ 491.909195][T19756] ? bpf_link_get_from_fd+0x110/0x110 [ 491.914569][T19756] ? get_pid_task+0x138/0x200 [ 491.919246][T19756] ? __mutex_unlock_slowpath+0xe2/0x610 [ 491.924783][T19756] ? lock_is_held_type+0xbb/0xf0 [ 491.929717][T19756] ? wait_for_completion+0x260/0x260 [ 491.935009][T19756] ? check_preemption_disabled+0x50/0x130 [ 491.940738][T19756] ? syscall_enter_from_user_mode+0x20/0x290 [ 491.946719][T19756] ? lockdep_hardirqs_on+0x53/0x100 [ 491.951915][T19756] do_syscall_64+0x2d/0x70 [ 491.956325][T19756] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 491.962206][T19756] RIP: 0033:0x45e179 [ 491.966094][T19756] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.985774][T19756] RSP: 002b:00007f1b8034fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 491.994179][T19756] RAX: ffffffffffffffda RBX: 0000000000001780 RCX: 000000000045e179 [ 492.002139][T19756] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 492.010096][T19756] RBP: 00007f1b8034fca0 R08: 0000000000000000 R09: 0000000000000000 [ 492.018057][T19756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 492.026015][T19756] R13: 00007ffe1d136f3f R14: 00007f1b803509c0 R15: 000000000118cf4c 17:50:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x7c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1ff, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11110, 0x0, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r2, &(0x7f0000000280)={&(0x7f00000003c0)=@generic={0x11, "fe0c360af9e25c009ef2232ab8ff3d3b849b56b94d12189f0090c06523f1bc139fc2f345aa567d86cf83ecfe6b5b536ca30a011c8ba631f3a582d07c0db79cdd88eea6bb479e3b0d7507359830e4285e1d42d2d08c5094b226cf12c0549b243217f077d1beed86ff9a7ba744341f651852011f60a052d77df405d181f363"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="cb969e33e2581c294ea04e04b12be46fe4cae6c2be052485e58db80cb2b6567426587511ab4ed371e9b600af325b881e18c38d1cac95aab7c754a99b128e3849972a937291ee858c23313e9c8d199150856682b97ab0b65f22", 0x59}, {&(0x7f00000004c0)="ef393af81f55d0f616f06b295deaea65781c72d3982b8f11c30a7f1e4b676f83d7559c775c0b66dc9b035af3d931ff1ade5e03138e5fdf64bf07408817893483681e21ce7847fe8d24e179ee445167bfab06b5121498f9aade2f87577233c22c3a34704ffd9e40855f447a7ca68776682a9fd5d258b3b86ff41a9c6a5b4032593627a336fd05b09491e8b6aba131a66a6faa7dde0efb9f622955f891cdaf4cee2784e818ab9545e9396553576031ccd1404419faf058bb0a44dbcb87158e35b7ac6d5c15deba532099bf439902b449041c6f9ee2c4da8742e3e8fdb3840e0982bd295772b2b7", 0xe6}, {&(0x7f0000001000)="f8a6285e4c79082c6852832a923671946359499bf0ba39f89583918cbb42484ec0e894f23c7ba99b8cbc21ac93cbc4e49d1213e04bd2d8e8b5f399f358986515a5ef48df0e35c07abb932c6af3b4b0fdec368ea245201b83979881befa73a56890035dd47766282faabbdceee1ababe4f9809a4c6179bb76ded1f8aecb9595ba67646756865c611cf9472e34479a046b7c0dbd1abf33596736d6e0cb3a10b80de73dc6235a7e6dddd17d5c830f1d4f9421a91bcf93eeba09319dc28865792632ac42f7fd2902b891328505a452c7388ebc36cf6517ceaa592fead5428e94c8804b1064b7f9b793d5ee402ca22f4f054768d203ee9ed97c1c0ce66fa1b26087dd5e8f42e8a37421d5be49b813058e86745fc9271cc1e3d2dbf4c11d19c9c618c9b18da8eae9f56b64dc05685c737e014d7245ce22aa482d60f100e37921a47612b70efbc9e1fa043370d40c5c817445fbc05cb69d88aa484eb3052a57fe66469f82795abfe1e2ad3415e71de840b4ed561fef2609145d55626aa3da31bed8c19b5022de8536c6f1d8e8b169233edd599f3a86afcfc50a33b7b870a4399a233607c570e6ee1ada12b76a4a6540ab9ed0bf4d6f554f57dee68cff9ff5a3829d42300d10ee6c375299c1be43b15a820f5855b903b42ac0563dec028183a3e4d8267c0938dc57dc80f84a2e014388fafd89e31cb66ba4ea53edba78253d3252c3e0eefd147335950848269aeaf46b40158addd6f05df234919ba5bed7f54e58eec8ecc8b62a59e9922416f5efb175d5d40af49538a3361fa1a2d8c1f2e423af9317c1910c48836caf649dfed4c5bd0164875e106b920ad264b72e8be286c36600cd3da1e8ba031691d6b0a13730bd8e6ffaa9f8cc154b7a1ada43b8a674d92b8903ae3fb4e16284bdf8e21e8b4f6dfc83bc5ead630329570faea7cb82a5c1bca3f2fe8f8265bd048685ef4ae5da97ee4a21233d54122c0e355da950ec0860b4500660c3ab44cdb6800e9147db8ed74e2d823bb1a85c4fe6f2c87892b7f27df017c9c0ba21593b872272373331b5cb3ee843a38ac6529b8a35e72e200fcc7d99b20a7021e3dac6235731be38d4a84d50a158029718e406234f127ac35d7359e566483620cdee86f5ed23cd2bc37b4715907c8422981b412793ec5301ca3140099d545605f9f09cedb3769119ee941372b4da809395fae75ce8cb71846e75771e8941e5ee5354367ff439767843f58b52ed752d07c9057ce6e96dcb72be50f983a739ac37a1b6fe40e57eb6482002e7572cd675f40dd68baab21de9e3020570117396746ca92de4245c421f7bd8de2636019eb25b4520ee674dd538f4753dd9fe34e9a39c9814f40ebc6a73916dd44914a2a62650e9b4582a0be27834220d4caf10c8d25e8f2d9316d8cab12afcdb305a49b7034669f01f46bad92aa7d76b4fef74ef091471b56c759ced5279854f771b697258df773332a409e3305e2e782aeb92d2651286851b59bd11d0be75b7f6693dbc013ad5f8aedd33da264eaf675f1f3b0d85bcfeeff8c21fdd1b5544532c3d9381710d719edaf0da6deeb65620e6d652a2d89506ca8fefa50e665b79dab68da86617d64b4689c71a9af84d6d914e791ad93de33122ef0f0aff62ba243425ce8e9bcee5dbd7d5a0e3be40a92c43b17b6fed68813c90423b0f501cbea8c007d599d2a6e0ffb40048db8bce02019c4527043f3f9b1548367f3efe766f2432cb48f9dee26fb2e38e0ee8ff22190546ffd21750e5da314b391622ee0104848f0ad06b6e763661b885a2c57f9633cfbe97d34c484686ab27f5a6cbaa2410826f599910972d5d279dc4a2d3463d3e81e503c822ca35032444e9b2b39b2b0cec05c6576dce830e6fd66b0e2236a388b0f2a80d32fd762394107fd04f6a0d57037ba54763df974c0f9a7a2da94efe2a22c1ecde4803a354e738c1322199a6c35ea470882e553af17a0deedf011fd2c3cfd3bf1dd5df87e5c4d23b76ebe8c6bbc8b5a6def69ffcd5ff734983fb5e002cec643ec323e5a1c7d577c5881774d72e3d40b56656f080fd7c23ed2b0780d48a3420de90177ec0fa343533f582520311f88dee329d314709a1912f20ec097035c01eb67282a5168325b024748d9f48421bec9e2ba98d44f3b1bdf6ec340cd10309f5a17e66e0db1f6445dde1e5e5fa6e12f6f49971ffa38ca6998f427c039e994d5b6e8d83b434c5711bac810c46d7ab13cbfaa56f481a1fb87d6ef5942bd04d1a39b4d620402c133c03ec43d8d3609f63e04cf2c53643e013b4563aaa7a11e5c2536b19376cf408017c10171bfcc784799adc5651a1e31a871addcb1551f8d43b898f035a9468c1769666acf0d2dd477bc53cfcdad7195cde72af6f501136762228d5e2eb7b5bfbc5f735696017b4448018a1d14594f21265b067a0f6062a2e4e241708092e8586c70c1393396ddc4e64eaad87f72f550c40bdfd4d8f7a9f70a24607090cdb15792b90a0391f4fc4946ae6ed440e508af15bfb510732cd497585cd670e19110f8184f3f8053c50cb79c310ca3a500dc0dad4648db86cb3e7fc0a571ef8d9b19bb9d4dd19ce40f373c3cc19a4676b6624e6a8002995812e60dcf2139e12f555234c6bf19391e3962f54dc240a204597778dccc1a5b1c26f07305dfbb3993b0bbcef08085a21e5ce8a93551bed7cb164ca1ba6c61ee35e583a496a7d63ff2187a4075e70cc9066415ee5d902e1fdd1dea3d797e1a488e2945a8d3a23d26efa51faae6c5e43ffd95e693af1c86f38c283c76b954025dfb75f42d6066df7ead5e8e9da4a27e2883a9cc988d3bfac465d441fff94b6eb15b20c30ab21240882677e1419de7c34e835563568264924fda808b015ec75139c981f7cb1f8a9aa1029af1760692184697b0afb87b53b34bdfe990e8ba5721fff8611dbff99a2a1e1b91107f410075a0f0b70c5df89f98abb2a20bb3c4a03fd06d8b12934e2828b260c81ea4a97cd74b735c9707cc9903f48a03a48d40961dec89eb49939497ea2700020b7dbd2a9a28b97bcde192752942599de976288984bd6258468d8efc3a97130e6293c3752472a2a35034e146422d2483ca65d84cd6561bb368e781f8ed8013dfdf1dfda83247d5c4233be6e871698a53d320d62c399ee79eb442c8e5ce2a7a5b68cc9e7a65840db7ee3bc71e3c3498bb80270f427f2f7da3271051263c207dac5059595fb62dce89053ab705e21e25981daf38c8eeb85fa6ccc5890fb2c10780403760c22de74b44c64fcca9a7befa51cc27d10d1c17a6fa5384aabcc433eec831fd697b905586d626040e9462a99100e1d48b20d55e98aabe16725910296963f99e6cceb3d1c559d46931acfc7997797724646e9d4a6847e3ef649319e585aafbbcdc802671b18692e5c4913b8f37ec0fb8b4060610f3e7eb9e871454b6ed734976c40a2668cc9994734f1932a15d755ccd23c61e8c8598a12f561b37717276c88124f185f49f7eb8a6b9d29ae1e98b48bbda18035e7ec637391b9212051a4612c3a16bce57ebd047f9a477bd9930b70d232900589b69916c74d39d4e2e5d030bf61e1c1b8593939174b07f36094e67e9d9c7739844570431e8ecf43cd1b33532f4752cf8dc5e463a7be200034ee93406f99b7320295d3f6236a69c28550d78ef60ca5f259fb17392e0c095812a1820b82b48d83ceb7659d0e8265f2c991172527fcc4e7f68b40bf1307b14a8eaa9f4754865ce087d53cd24e3f3dc4dff1488ff7db67ca524fb18005f3317eee9cf1683a603fe702ee2cf468c8ffebf5720486b50b929a706d7f035d43e2fc01758f9270e2703da83e3df2cd2ab77cba3796c29f649fb0181d92ca06dc86a0fb1752704192742de0fefd9124d4e9409aae3f4f8f5e66440bcca4ca7d9ae34e47b92f3cc4b5d361930b0225dd6e5df1ec097935ac0985d730b4ec9c65dcb25ba62b21778d442f47237390c7b236d9e0f59d92d85e78209cb6e088a4018c15e5db72596560910bebbe07b0288f361b02a7daa41f0a563f0f72de14b7b2944d2d0b1108daffeb3497ea342e883e406fcc60ed6688a118afef5fb648b9497ee086d42212f219b38ab06cf0f70c18a403dd5b07afa2be61a93a543b22a1ce19d9b8b4850d0a0c07ac2844c1f5eacab1c075bcdb20113fd11944406f518d35520f2984068022ce6819e784fa18616b83d4e59298b528793dcdad5afedb8486e7f97e1631ce0908e64d74579c9cd0c0500d25f955c60d3e0994dc48f9672cee6ee7a234186f3adbd0bec8534a4b5db3efe02ebd1eeec7a8045739ed5da44a5ace028806c45f4607e86a6da08a3eff92c78f2973ce97a989dc5c8e901b5e1a32506088fe8e511d95fff85683a344fb35bbae35367fd385a0774ef06a7b0b30c2d7b1f496b34a77529a5cc9c50cf5db04ec683012dc41c73ce0adecf1236e46d44534cf60466c032518523334d0fa664718c2ada10875423a6b83187550549fca39a537cbef481e3c7593abd02832450c38db5f088c130417b2fa06245cfa23f6d409d3163fe6a3c5cc55e8fca60d5f0f9a45d8bb9c2ba81e934f1072c4ba2b681dce639031e00aafd51e558397d02ac3c3acd9705fc0c5e56fb09fc3091da1c4f2cffcc1eabe016e7df197ca75edd0f4ed59dd14389e24466d6a2f35d34ea9a095ebe1a44cb15eaa184200782b507174114bbcbf9d87feaaa799828b325445db19688b41c53fd83bfd0a3c8d8eac82ef1c90fa373ddee17bfc430423276dc1951909f5ef66bb983b73d8e1fb6ca1e89e20c99efd10e8f680d8728c7db2a85ab7b7470f5b3353cf0c6b27d16081eb207cae25296cf31eca7b45b40914bc74fbf35cfe9e1ffa6ed6d34556421f2679e4d5e53c4d11700f52747c850689e4e0e5d95965e770106612f04c49e53b52e4386465a169c17dc888bb75bcb49f445f56deef2019face8e455ca944bc016ad0d3d06bfa296b3fd49f6b580f7391a5389f439d7b605e7e6acdcd9198f461b9f3e85385688cd7e2fbfdd388c132071b0223230317dde3955b6d8c6055ee294e34ba2c757a7e7a59752a9c77c59cff53b0d6596e9062ee8da68fe4f81bf11f27031496e93e61e008d37de2d0d95236f4ba9bf1d7bec412a677b9b13ac5974f6e8520b07648c614dd2e649c93adc63ea0b7fbb7a1a8cf635c56f0dfea461217bcb13b2147e1bbddf2ddddab68fab8ecbf9c1e70dd3623b7be10b4c9749c38ac58b8aab7a192351ef3800e4e2135c0bd2a563bbc87d9d2005be761ecd0454b137ebfe5d1428a78c3b1d8a3f39e393a08a998b97d983502b02d81eda00da8f18599aba66fa09cc1227010c8b0e0c1b90c550a9b0c76a3c618b45d1114ff03e09cc3eb44d81ffc84ec7283817fc798bc515bddeabd5c587ecbbe85c1ca2870bdd8147b11bd68dbd2790f3d7901dc70c7b3e47a9dd7fbd80aaf5a6324ffbacd4933cf7e739a064701c1ae538bff9597dffa3cc9c80765e6004b9f0941fad468a4c823c5ae884ab4d3fdb1cabe261c69fa6a9d1725b69b58ec13c53cd87cde9325f28f122b0d025d686cea5b0198796dd1456b028d5489d222811dcb18dbb5a5874699428b3a01d76d6096a08cb00c79bf5f1a194ec3c097829bda8bbb822702312d5e13f55b8526d7e2e95268395f5dc3fdbcd9779c1951e5ab1780e40f1a6f99bbf4ca1567a3c2a2f5cff8fd335517bdaef9959e036d3ebcbc9047e30e0722e0e0863ae08048c3b4372706d18d9a068dc47ca8c59e3d066d94538474cec9acd40e359441505ec61afc93464036", 0x1000}, {&(0x7f0000000200)="01376a5900dd82d6a108549a23459871", 0x10}, {&(0x7f00000005c0)="4a08d124444984facf7d0f2e5eee6b6fc2101666a67f2b7c201d978af998ee251c4d6ff1bee2479ddccabc066fc0ca47e9b2a0289769581f571e7c0b92499f57449b3119d24688efd950427b9279a2656c999d644cf6127940f9b36a8cf9497f987793eab32a549aade9b508db7c00343362f9c6ea14d84f52c675a4c82de53acac40b87ac60ca3e284f2fee41d1e45aca960454893439d931527f727480aff7fabf7dd42fd888f42c4d0ad25c5957123bf29dc67a6106", 0xb7}, {&(0x7f0000000680)="cf8dc31566a44c4095a25db03c9e960544c8df0b37c1f6675a1ac4101f89f3a2d3e5190c8461790728b5ca1e6df677120704b57ea6ee12da856177477d81e74edf7762a9acded9f99d9fa447b1d1047ae4ffa5c73c1fc3c0ab983cf8a7960fcf80efca21dab047e10d9a531802adfbe8b6", 0x71}], 0x6, &(0x7f0000003080)=ANY=[@ANYBLOB="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"], 0x1010}, 0x20040001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x1, 0x70, 0x8, 0x0, 0x5, 0x0, 0x0, 0x8, 0x98, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x40018, 0x5, 0x20, 0x2, 0x7, 0x426, 0xbf}) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r3) openat$cgroup_ro(r3, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x1a, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x300}, 0x0) 17:50:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000000f000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0xffffff1f}, 0x0) 17:50:39 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000023a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x2}, 0x0) 17:50:40 executing program 0 (fault-call:6 fault-nth:4): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000033a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:40 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) [ 492.979457][T19798] FAULT_INJECTION: forcing a failure. [ 492.979457][T19798] name failslab, interval 1, probability 0, space 0, times 0 [ 492.992210][T19798] CPU: 1 PID: 19798 Comm: syz-executor.0 Not tainted 5.9.0-rc3-syzkaller #0 [ 493.000886][T19798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.010934][T19798] Call Trace: [ 493.014231][T19798] dump_stack+0x198/0x1fd [ 493.018570][T19798] should_fail.cold+0x5/0x14 [ 493.023172][T19798] should_failslab+0x5/0xf [ 493.027590][T19798] slab_pre_alloc_hook.constprop.0+0x3d/0x1f0 [ 493.033664][T19798] kmem_cache_alloc_node_trace+0x55/0x430 [ 493.039386][T19798] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 493.045462][T19798] __kmalloc_node_track_caller+0x38/0x60 [ 493.051100][T19798] pskb_expand_head+0x15a/0x1040 [ 493.056039][T19798] ? memcpy+0x39/0x60 [ 493.060031][T19798] ? __skb_clone+0x586/0x770 [ 493.064629][T19798] skb_ensure_writable+0x2c7/0x450 [ 493.069748][T19798] bpf_clone_redirect+0x125/0x420 [ 493.074779][T19798] bpf_prog_5e3b4e18def6d727+0x5c/0x544 [ 493.080333][T19798] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 493.086317][T19798] ? build_skb+0x1c/0x190 [ 493.090674][T19798] ? bpf_prog_test_run_skb+0x30c/0x1c10 [ 493.096230][T19798] ? lock_is_held_type+0xbb/0xf0 [ 493.101174][T19798] ? find_held_lock+0x2d/0x110 [ 493.105943][T19798] ? ktime_get+0x3e/0x120 [ 493.110280][T19798] ? lock_downgrade+0x830/0x830 [ 493.115128][T19798] ? bpf_test_run+0x119/0xcf0 [ 493.119814][T19798] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 493.126315][T19798] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 493.132301][T19798] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 493.138821][T19798] ? lockdep_hardirqs_on+0x53/0x100 [ 493.144021][T19798] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 493.150540][T19798] ? read_seqcount_t_begin.constprop.0+0x133/0x1e0 [ 493.157038][T19798] ? ktime_get+0xd8/0x120 [ 493.161377][T19798] bpf_test_run+0x3be/0xcf0 [ 493.165885][T19798] ? __phys_addr+0x9a/0x110 [ 493.170392][T19798] ? eth_type_trans+0x360/0x690 [ 493.175242][T19798] ? bpf_test_finish.isra.0+0x270/0x270 [ 493.180783][T19798] ? __build_skb+0x53/0x60 [ 493.185204][T19798] bpf_prog_test_run_skb+0xa4c/0x1c10 [ 493.190586][T19798] ? bpf_prog_test_run_tracing+0x330/0x330 [ 493.196394][T19798] ? fput_many+0x2f/0x1a0 [ 493.200747][T19798] ? bpf_prog_test_run_tracing+0x330/0x330 [ 493.206551][T19798] __do_sys_bpf+0x1770/0x4c60 [ 493.211224][T19798] ? vfs_write+0x397/0x730 [ 493.215640][T19798] ? bpf_link_get_from_fd+0x110/0x110 [ 493.221015][T19798] ? get_pid_task+0x138/0x200 [ 493.225710][T19798] ? __mutex_unlock_slowpath+0xe2/0x610 [ 493.231255][T19798] ? lock_is_held_type+0xbb/0xf0 [ 493.236194][T19798] ? wait_for_completion+0x260/0x260 [ 493.241518][T19798] ? check_preemption_disabled+0x50/0x130 [ 493.247258][T19798] ? syscall_enter_from_user_mode+0x20/0x290 [ 493.253246][T19798] ? lockdep_hardirqs_on+0x53/0x100 [ 493.258453][T19798] do_syscall_64+0x2d/0x70 [ 493.262869][T19798] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 493.268758][T19798] RIP: 0033:0x45e179 [ 493.272653][T19798] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.292277][T19798] RSP: 002b:00007f1b8034fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 493.300694][T19798] RAX: ffffffffffffffda RBX: 0000000000001780 RCX: 000000000045e179 [ 493.308667][T19798] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 493.316656][T19798] RBP: 00007f1b8034fca0 R08: 0000000000000000 R09: 0000000000000000 [ 493.324633][T19798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 493.332609][T19798] R13: 00007ffe1d136f3f R14: 00007f1b803509c0 R15: 000000000118cf4c 17:50:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000043a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x3}, 0x0) 17:50:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x1b, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:40 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:40 executing program 0 (fault-call:6 fault-nth:5): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x7c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1ff, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11110, 0x0, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r2, &(0x7f0000000280)={&(0x7f00000003c0)=@generic={0x11, "fe0c360af9e25c009ef2232ab8ff3d3b849b56b94d12189f0090c06523f1bc139fc2f345aa567d86cf83ecfe6b5b536ca30a011c8ba631f3a582d07c0db79cdd88eea6bb479e3b0d7507359830e4285e1d42d2d08c5094b226cf12c0549b243217f077d1beed86ff9a7ba744341f651852011f60a052d77df405d181f363"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="cb969e33e2581c294ea04e04b12be46fe4cae6c2be052485e58db80cb2b6567426587511ab4ed371e9b600af325b881e18c38d1cac95aab7c754a99b128e3849972a937291ee858c23313e9c8d199150856682b97ab0b65f22", 0x59}, {&(0x7f00000004c0)="ef393af81f55d0f616f06b295deaea65781c72d3982b8f11c30a7f1e4b676f83d7559c775c0b66dc9b035af3d931ff1ade5e03138e5fdf64bf07408817893483681e21ce7847fe8d24e179ee445167bfab06b5121498f9aade2f87577233c22c3a34704ffd9e40855f447a7ca68776682a9fd5d258b3b86ff41a9c6a5b4032593627a336fd05b09491e8b6aba131a66a6faa7dde0efb9f622955f891cdaf4cee2784e818ab9545e9396553576031ccd1404419faf058bb0a44dbcb87158e35b7ac6d5c15deba532099bf439902b449041c6f9ee2c4da8742e3e8fdb3840e0982bd295772b2b7", 0xe6}, {&(0x7f0000001000)="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", 0x1000}, {&(0x7f0000000200)="01376a5900dd82d6a108549a23459871", 0x10}, {&(0x7f00000005c0)="4a08d124444984facf7d0f2e5eee6b6fc2101666a67f2b7c201d978af998ee251c4d6ff1bee2479ddccabc066fc0ca47e9b2a0289769581f571e7c0b92499f57449b3119d24688efd950427b9279a2656c999d644cf6127940f9b36a8cf9497f987793eab32a549aade9b508db7c00343362f9c6ea14d84f52c675a4c82de53acac40b87ac60ca3e284f2fee41d1e45aca960454893439d931527f727480aff7fabf7dd42fd888f42c4d0ad25c5957123bf29dc67a6106", 0xb7}, {&(0x7f0000000680)="cf8dc31566a44c4095a25db03c9e960544c8df0b37c1f6675a1ac4101f89f3a2d3e5190c8461790728b5ca1e6df677120704b57ea6ee12da856177477d81e74edf7762a9acded9f99d9fa447b1d1047ae4ffa5c73c1fc3c0ab983cf8a7960fcf80efca21dab047e10d9a531802adfbe8b6", 0x71}], 0x6, &(0x7f0000003080)=ANY=[@ANYBLOB="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"], 0x1010}, 0x20040001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x1, 0x70, 0x8, 0x0, 0x5, 0x0, 0x0, 0x8, 0x98, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x40018, 0x5, 0x20, 0x2, 0x7, 0x426, 0xbf}) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r3) openat$cgroup_ro(r3, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.100594][T19807] RSP: 002b:00007f1b8034fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 494.108996][T19807] RAX: ffffffffffffffda RBX: 0000000000001780 RCX: 000000000045e179 [ 494.116958][T19807] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 494.124918][T19807] RBP: 00007f1b8034fca0 R08: 0000000000000000 R09: 0000000000000000 [ 494.133833][T19807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 17:50:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000083a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x4}, 0x0) [ 494.141813][T19807] R13: 00007ffe1d136f3f R14: 00007f1b803509c0 R15: 000000000118cf4c 17:50:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x8}, 0x0) 17:50:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000093a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x9}, 0x0) 17:50:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400000e3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x1c, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xe}, 0x0) 17:50:42 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x7c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1ff, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11110, 0x0, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r2, &(0x7f0000000280)={&(0x7f00000003c0)=@generic={0x11, "fe0c360af9e25c009ef2232ab8ff3d3b849b56b94d12189f0090c06523f1bc139fc2f345aa567d86cf83ecfe6b5b536ca30a011c8ba631f3a582d07c0db79cdd88eea6bb479e3b0d7507359830e4285e1d42d2d08c5094b226cf12c0549b243217f077d1beed86ff9a7ba744341f651852011f60a052d77df405d181f363"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="cb969e33e2581c294ea04e04b12be46fe4cae6c2be052485e58db80cb2b6567426587511ab4ed371e9b600af325b881e18c38d1cac95aab7c754a99b128e3849972a937291ee858c23313e9c8d199150856682b97ab0b65f22", 0x59}, {&(0x7f00000004c0)="ef393af81f55d0f616f06b295deaea65781c72d3982b8f11c30a7f1e4b676f83d7559c775c0b66dc9b035af3d931ff1ade5e03138e5fdf64bf07408817893483681e21ce7847fe8d24e179ee445167bfab06b5121498f9aade2f87577233c22c3a34704ffd9e40855f447a7ca68776682a9fd5d258b3b86ff41a9c6a5b4032593627a336fd05b09491e8b6aba131a66a6faa7dde0efb9f622955f891cdaf4cee2784e818ab9545e9396553576031ccd1404419faf058bb0a44dbcb87158e35b7ac6d5c15deba532099bf439902b449041c6f9ee2c4da8742e3e8fdb3840e0982bd295772b2b7", 0xe6}, {&(0x7f0000001000)="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", 0x1000}, {&(0x7f0000000200)="01376a5900dd82d6a108549a23459871", 0x10}, {&(0x7f00000005c0)="4a08d124444984facf7d0f2e5eee6b6fc2101666a67f2b7c201d978af998ee251c4d6ff1bee2479ddccabc066fc0ca47e9b2a0289769581f571e7c0b92499f57449b3119d24688efd950427b9279a2656c999d644cf6127940f9b36a8cf9497f987793eab32a549aade9b508db7c00343362f9c6ea14d84f52c675a4c82de53acac40b87ac60ca3e284f2fee41d1e45aca960454893439d931527f727480aff7fabf7dd42fd888f42c4d0ad25c5957123bf29dc67a6106", 0xb7}, {&(0x7f0000000680)="cf8dc31566a44c4095a25db03c9e960544c8df0b37c1f6675a1ac4101f89f3a2d3e5190c8461790728b5ca1e6df677120704b57ea6ee12da856177477d81e74edf7762a9acded9f99d9fa447b1d1047ae4ffa5c73c1fc3c0ab983cf8a7960fcf80efca21dab047e10d9a531802adfbe8b6", 0x71}], 0x6, &(0x7f0000003080)=ANY=[@ANYBLOB="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"], 0x1010}, 0x20040001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x1, 0x70, 0x8, 0x0, 0x5, 0x0, 0x0, 0x8, 0x98, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x40018, 0x5, 0x20, 0x2, 0x7, 0x426, 0xbf}) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r3) openat$cgroup_ro(r3, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1400000f3a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf}, 0x0) 17:50:42 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x60}, 0x0) 17:50:42 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:42 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000603a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x1d, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0}, 0x0) 17:50:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003f000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40880) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000140)='devices.deny\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003680)={&(0x7f0000001d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x4, 0x1, {0xa, 0x4e24, 0x3, @dev, 0x7}}}, 0x80, &(0x7f0000003400)=[{&(0x7f0000001fc0)}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000500)='\fas', 0x3}, {&(0x7f0000003280)="9b063929ee5ed074c941b7133229dcadfc73e8169b510a327f204e3979741db8ebbdcc811202212cabcd1a8d4182323aa2602ba27b183ab88aa8614f3e20c2de7ae241da87aaa5c7c3d1548b02d527f651de7bdb58660b63cd18c6b58b832e4018efe6878efd060630a49f81d7d6181feb0a738d78fee9853e54a50cd2", 0x7d}], 0x6, &(0x7f0000003480)=[{0x10, 0x29, 0x1ff}, {0x10, 0x101, 0xa339}], 0x20}, 0x81) recvmsg(r1, &(0x7f00000004c0)={&(0x7f0000000280)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000300)=""/70, 0x46}], 0x1, &(0x7f00000003c0)=""/242, 0xf2}, 0x1) recvmsg(r1, &(0x7f00000113c0)={&(0x7f00000102c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000010380)=[{&(0x7f0000010340)=""/42, 0x2a}], 0x1, &(0x7f00000103c0)=""/4096, 0x1000}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@map=0x1, 0xffffffffffffffff, 0x14}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000011480)={0x1f, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="180f020004000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000085100000f8ffffff950000000000000018260000", @ANYRES32=r1, @ANYBLOB="0000000039a500008500000086000000"], &(0x7f00000001c0)='GPL\x00', 0xf3, 0x4b, &(0x7f0000000200)=""/75, 0x40f00, 0x1, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000011400)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000011440)={0x3, 0xa, 0x80000000, 0x1}, 0x10, 0x0, r1}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004a40)={&(0x7f0000001f00)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80, &(0x7f00000049c0)=[{&(0x7f0000001e80)=""/17, 0x11}, {&(0x7f00000036c0)=""/4096, 0x1000}, {0x0}, {&(0x7f00000047c0)=""/242, 0xf2}, {&(0x7f0000001f80)=""/31, 0x1f}, {0x0}], 0x6}, 0x60) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0xa, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000010008108040f9becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020200bf050005001201", 0x2e}], 0x1}, 0x0) 17:50:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000000f000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:43 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x300}, 0x0) 17:50:43 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x470}, 0x0) 17:50:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a020511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:43 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) [ 496.622843][T19899] device batadv0 entered promiscuous mode 17:50:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x1e, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x900}, 0x0) 17:50:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)=@isdn, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/81, 0x51}, {&(0x7f0000000100)=""/16, 0x10}, {&(0x7f0000000380)=""/245, 0xf5}], 0x4}, 0x10002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x8001c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xfff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x4ea00) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100008, 0x500001c) 17:50:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a030511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:44 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a040511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xe00}, 0x0) 17:50:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) [ 497.055247][ T27] audit: type=1804 audit(1601142644.325:70): pid=19923 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir161320885/syzkaller.80PAPX/425/memory.events" dev="sda1" ino=16376 res=1 errno=0 17:50:44 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:44 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a080511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) [ 497.298387][ T27] audit: type=1804 audit(1601142644.565:71): pid=19934 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir161320885/syzkaller.80PAPX/425/memory.events" dev="sda1" ino=16376 res=1 errno=0 [ 497.435887][ T27] audit: type=1800 audit(1601142644.605:72): pid=19934 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="memory.events" dev="sda1" ino=16376 res=0 errno=0 17:50:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x21, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf00}, 0x0) 17:50:45 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) getpid() r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xa592, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000015c0)}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x80000000, 0x2000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x438, 0x6, 0x0, 0xfff, 0x0, 0x1}, r3, 0x0, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x4, 0x1, 0x0, 0x2, 0x0, 0x8001, 0x31160, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, @perf_bp={&(0x7f0000000040)}, 0x2219, 0x53b5, 0x2, 0x4, 0x9, 0x4, 0x5}, r3, 0x2, r4, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, r0, 0xa}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x249000) 17:50:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a090511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:45 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x6000}, 0x0) 17:50:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a0e0511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:45 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x7004}, 0x0) 17:50:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a0f0511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x22, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:45 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a600511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:50:45 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@l2tp={0x2, 0x0, @broadcast, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)="a35e42ebbf41ac597237cd8271eb850f260b716b8e98c7d6d401925ccb771f5bdf321068fb3983abec1ac99dc3d09f9febc51c74021220b850e70c2077b98190a9f2c3d53202e5bfc83efd619e866cae3fc823a0eb3303c37cbfd9048d087b145bb4a10b45ec29a0d1e78866784547359f6477acaaf534fa2899ca75f3875b09f5a32e2c326f44015e5a84fb6ec4a9f82da5882e95152d5a5c16395526432aa1413f92567fff9856fb5153ea", 0xac}], 0x1}, 0x20000040) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000380)=@llc={0x1a, 0x321, 0x1, 0x8, 0x1, 0x1f, @multicast}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000400)="8ede25639d77d7e15c5e77598dbb", 0xe}], 0x1, &(0x7f0000000480)=[{0xe8, 0x103, 0xffffffff, "f14a63ef8a6d2c1c101ba7aa77f0ce5d1dec911567f34250e967a2eb5c9c042b9eb4d8be77539a3b437603dec8e3bd512444f5668e10dcc6c297b7f82ad16ddd711e911b1c243745a580203e0aa95f574d681256e08a3ad58137705051e651366501c858e01eb86ad97ddfefa73b1989003a238a522963b049d1cb85c3332755150d60c69b46253fb4147b758b49d0c0d3ca292144b57db9cfbdd9a357cd5cdfcc375b3e948a856ca4351534bee80c647e6a983527a7fbe5d37877fa210b4c7aba6e55cdd6506f1b3c6ee0439f44de3da7ae1984"}, {0x48, 0x10e, 0x4, "201b2cf45b7967e652ca907ce75636780a2ab8fd2d70554ebe76700a3e7d4bf9b4322f08dd1539391450da1ffacaf448884ccf14c7be0f"}], 0x130}, 0x64004880) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000940)={'syzkaller1\x00', @remote}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x400000000) recvmsg$kcm(r1, &(0x7f0000009240)={&(0x7f0000007080)=@can={0x1d, 0x0}, 0x80, &(0x7f00000091c0)=[{0x0}, {&(0x7f0000008100)=""/4096, 0x1000}, {&(0x7f0000009100)=""/135, 0x87}], 0x3, &(0x7f0000009200)=""/10, 0xa}, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000009280)=r3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0x10, &(0x7f0000000840)={&(0x7f0000000780)=""/183, 0xb7, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x7, 0x2, &(0x7f0000000600)=@raw=[@ldst={0x1, 0x2, 0x1, 0x0, 0x8, 0x40, 0x1}, @ldst={0x3, 0x3, 0x3, 0x8, 0x0, 0x80, 0x8}], &(0x7f0000000640)='syzkaller\x00', 0x100, 0x70, &(0x7f0000000680)=""/112, 0x41100, 0xd, [], r3, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0x3, 0x1, 0x4}, 0x10, r4}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu~\'\'&!~\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk\xc11\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE\x1a\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d') 17:50:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf000}, 0x0) 17:50:46 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x34000}, 0x0) 17:50:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0224fc60", 0x14}], 0x1}, 0x0) 17:50:46 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d03c0fc60", 0x14}], 0x1}, 0x0) 17:50:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x400300}, 0x0) 17:50:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x23, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:46 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:46 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0xf}], 0x1}, 0x0) 17:50:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0ffff}, 0x0) 17:50:46 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x1000}, 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)=@phonet, 0x80, &(0x7f0000001740)=[{&(0x7f0000000140)}, {&(0x7f0000000180)=""/69, 0x45}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/223, 0xdf}, {&(0x7f0000000300)=""/140, 0x8c}, {&(0x7f00000014c0)=""/254, 0xfe}, {&(0x7f00000015c0)=""/211, 0xd3}, {&(0x7f00000016c0)=""/83, 0x53}], 0x8, &(0x7f00000017c0)=""/4096, 0x1000}, 0x23) socketpair(0x3, 0x5, 0x5, &(0x7f0000000140)) r0 = gettid() r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0xa, &(0x7f0000000000)='^/)%-\\%}-\x00'}, 0x30) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='ext4_drop_inode\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) 17:50:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0xc0}], 0x1}, 0x0) 17:50:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x1000000}, 0x0) 17:50:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:47 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:47 executing program 2: socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000240)='\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xc3\xa9\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xc4\xd2\x9a\xf5\xd5\a\x00\x00\x00\xa1\a\xde\xbb\xc18O\xb3\x8356utY#\xb8\xbd\xfa\x0e5ko\x84\x83:f\xcb\xe8oGArYZ\xe1\xc9\x86\xfc\x9fR\x0f\xd1rzt\x8a\x13\xae1\x8cN\xfat\xc9\x90R\x80k\xce\xf1\x04\xe4\xb6\xe6\x00\xa2\x1e\xd5T6x9\xe8\xb2?\x19\xb3\x90j\xc1\x97\xc7\xcb\xd2\xc7\x9c^\xe7_\xb0,h\xa3\xddj&\n\xd5S\'P\x856') r0 = gettid() r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6%\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x2, 0xfffffffffffffffd}, 0x8830, 0x4, 0x80000001}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f0000001ac0)=@nfc={0x27, 0x1, 0x0, 0x4}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001b40)="80c3ea4f20a052b10a757837a242b0895d5957c8e1e81058798d2ce057d50773197686f9879d03f398db06b6b68587122d813628", 0x34}, {&(0x7f0000001b80)="f885ea7dc5ff2cfd1134b96270c67c3b0443e1da5c8da8e665f0598b7d705ec72f988e4180e87d1a43d97e8d185ff1d77bbdb343e2b58e975ef2a17c4de5f16b16b30c666b61c46e3ff029dcecaaf0a63e7c05f669fba184e7a55cb0c072d649ff5e51d0daa016e83308246bd655bf425e92247f6e550c7e20f7bd0fbc6f8c263d1d43df0b02a4d0f1175ab2fd96785ad022e17a19ff2ae1a60f7d2aab7bf252a54c07d8f2017db79648523ca1bf0e4f71f14e389be025fadd2ec2b8890f2f858fe9dae76c5b8f547fd7f71735528a9fa8b7b4a9f310a4ae1854f7b726566ba83f13ff13ea1407", 0xe7}, {&(0x7f0000001c80)="2a68536c853bac66b59a9faaa6ff6337bf522fa6b618365af2ddeb298a582f1a298962184d57411fd16ae2a8ae886b4203e979cea02a5e9cb835867b0bf3e0de014d7b5d0a807342784d5050ad3cbe2f16b27c9514c7db9d9463e6063f0f75b0ac021dd7380b0885e72167860eb6daaee3544aee46303e11c0ae02d683e4701277eefae2bf9752c0fc8532ca6e5eea7008a79c3898787fb6977dda88c98e6499beffdc2291be618fcd971c61631e5ec12bba578904b99d3c98bd85e5e3ca1d78a0cb1c90787e5379946f19e96a23ce22c9324e1dcfaf542f08f88f42c29d7879c47ac6cea458c55a776d9ab9c00f3d6bbf6a3af645064661", 0xf8}, {&(0x7f0000001d80)="1e7581c20700b20aa10af7385a33b61673ce58d06887634f551d505aca012a503ae793edbde86fd3afefa3bd33e04ec6d58770be82c8e677067522c897f7d543a898e2092e2d530a1a215134d414f0d8c92c95503a36ca2f636d62fa016f58a42657205634b6103a1a99075fb6a34b196c8d513cf6e6d4a573bf3191f202ad20948320ea9311541ac7294a7420ec1c3caabde8d5c99df45f59a9ef2fe0017c6db0e4b1", 0xa3}], 0x4, &(0x7f0000000380)=ANY=[@ANYRES16=r2, @ANYRES64], 0xa8}, 0x20004050) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000025000535d25a80648c63940d0124fc60", 0x14}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x9, 0x1629, 0x2, 0x30000000}, r0, 0xa, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r7}, 0x10) close(r6) 17:50:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0xec0}], 0x1}, 0x0) 17:50:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x24, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x2000000}, 0x0) 17:50:47 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:47 executing program 2: socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000240)='\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xc3\xa9\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xc4\xd2\x9a\xf5\xd5\a\x00\x00\x00\xa1\a\xde\xbb\xc18O\xb3\x8356utY#\xb8\xbd\xfa\x0e5ko\x84\x83:f\xcb\xe8oGArYZ\xe1\xc9\x86\xfc\x9fR\x0f\xd1rzt\x8a\x13\xae1\x8cN\xfat\xc9\x90R\x80k\xce\xf1\x04\xe4\xb6\xe6\x00\xa2\x1e\xd5T6x9\xe8\xb2?\x19\xb3\x90j\xc1\x97\xc7\xcb\xd2\xc7\x9c^\xe7_\xb0,h\xa3\xddj&\n\xd5S\'P\x856') r0 = gettid() r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6%\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x2, 0xfffffffffffffffd}, 0x8830, 0x4, 0x80000001}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f0000001ac0)=@nfc={0x27, 0x1, 0x0, 0x4}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001b40)="80c3ea4f20a052b10a757837a242b0895d5957c8e1e81058798d2ce057d50773197686f9879d03f398db06b6b68587122d813628", 0x34}, {&(0x7f0000001b80)="f885ea7dc5ff2cfd1134b96270c67c3b0443e1da5c8da8e665f0598b7d705ec72f988e4180e87d1a43d97e8d185ff1d77bbdb343e2b58e975ef2a17c4de5f16b16b30c666b61c46e3ff029dcecaaf0a63e7c05f669fba184e7a55cb0c072d649ff5e51d0daa016e83308246bd655bf425e92247f6e550c7e20f7bd0fbc6f8c263d1d43df0b02a4d0f1175ab2fd96785ad022e17a19ff2ae1a60f7d2aab7bf252a54c07d8f2017db79648523ca1bf0e4f71f14e389be025fadd2ec2b8890f2f858fe9dae76c5b8f547fd7f71735528a9fa8b7b4a9f310a4ae1854f7b726566ba83f13ff13ea1407", 0xe7}, {&(0x7f0000001c80)="2a68536c853bac66b59a9faaa6ff6337bf522fa6b618365af2ddeb298a582f1a298962184d57411fd16ae2a8ae886b4203e979cea02a5e9cb835867b0bf3e0de014d7b5d0a807342784d5050ad3cbe2f16b27c9514c7db9d9463e6063f0f75b0ac021dd7380b0885e72167860eb6daaee3544aee46303e11c0ae02d683e4701277eefae2bf9752c0fc8532ca6e5eea7008a79c3898787fb6977dda88c98e6499beffdc2291be618fcd971c61631e5ec12bba578904b99d3c98bd85e5e3ca1d78a0cb1c90787e5379946f19e96a23ce22c9324e1dcfaf542f08f88f42c29d7879c47ac6cea458c55a776d9ab9c00f3d6bbf6a3af645064661", 0xf8}, {&(0x7f0000001d80)="1e7581c20700b20aa10af7385a33b61673ce58d06887634f551d505aca012a503ae793edbde86fd3afefa3bd33e04ec6d58770be82c8e677067522c897f7d543a898e2092e2d530a1a215134d414f0d8c92c95503a36ca2f636d62fa016f58a42657205634b6103a1a99075fb6a34b196c8d513cf6e6d4a573bf3191f202ad20948320ea9311541ac7294a7420ec1c3caabde8d5c99df45f59a9ef2fe0017c6db0e4b1", 0xa3}], 0x4, &(0x7f0000000380)=ANY=[@ANYRES16=r2, @ANYRES64], 0xa8}, 0x20004050) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000025000535d25a80648c63940d0124fc60", 0x14}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x9, 0x1629, 0x2, 0x30000000}, r0, 0xa, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r7}, 0x10) close(r6) 17:50:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x33fe0}], 0x1}, 0x0) 17:50:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x200001d4}], 0x1}, 0x0) 17:50:48 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x3000000}, 0x0) 17:50:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x6, 0xfd, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000200), 0x7}, 0x0, 0x101, 0x80000000, 0x6, 0x0, 0x8, 0x1}, r0, 0xe, r1, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_int(r4, &(0x7f0000000300)='cpuset.cpus\x00', 0x2, 0x0) getpid() perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0xfa, 0xf4, 0x1, 0xd5, 0x0, 0x3, 0x10, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x8}, 0x10000, 0x7fff, 0x0, 0x3, 0x1ec, 0x1c7c, 0x2}, 0x0, 0x3, r4, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000a0000000a0000000030000000100000000000009030000000d00000000000009050000000100000006000085390000000900000001000000ffff00000f00000000000000287f00000d00000004000000070000000600000005000000400000001000000003000000517900000900000005000000030000000200000002000005040000000a00000001000000f04800001000000000000000010001000b0000000000ec0d0400000000000000006100"], &(0x7f0000000c40)=""/4096, 0xbb, 0x1000}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000020000"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0xe8, &(0x7f0000000400)=""/232, 0x41100, 0x4, [], 0x0, 0x0, r6, 0x8, &(0x7f00000006c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0xe, 0x6, 0x1000}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000002c0)='memory.events\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={0xffffffffffffffff, r4, 0xa}, 0x10) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x249000) 17:50:48 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x4000000}, 0x0) 17:50:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x25, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:48 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x7ffff000}], 0x1}, 0x0) 17:50:48 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x8000000}, 0x0) 17:50:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xffffffff}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"/1439], &(0x7f0000000100)='GPL\x00'}, 0x48) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0x13, 0x1}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) 17:50:49 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x9000000}, 0x0) 17:50:49 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0xfffffdef}], 0x1}, 0x0) 17:50:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xe000000}, 0x0) 17:50:49 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x26, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x2}, 0x0) 17:50:49 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x13, 0x7, 0xff, 0x1, 0x14, 0xffffffffffffffff, 0xfffffffe, [], 0x0, r2, 0x5, 0x0, 0x5}, 0x40) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1, 0x3}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r4}, 0xc) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000440)) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000005, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000002002000000000000000000000604000000000000000000000b010000000000000001000084800000320000000002"], &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) 17:50:49 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf000000}, 0x0) 17:50:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x3}, 0x0) [ 502.704988][T20161] BPF:Invalid section offset 17:50:50 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:50 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x60000000}, 0x0) [ 502.820155][T20169] BPF:Invalid section offset 17:50:50 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000280)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000480)="ff0f000056", 0x5}], 0x1}, 0x20000000) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1, 0x0, 0x0, 0x1100}, 0x6d70) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x8a, 0x0, 0x1, 0x0, 0x6, 0x8103, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x5}, 0x9000, 0xb, 0x0, 0x4, 0xff, 0x101}, 0x0, 0x0, r2, 0x2) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid_for_children\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000040)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000240)) openat$cgroup_ro(r1, &(0x7f00000003c0)='pids.current\x00', 0x0, 0x0) 17:50:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x8}, 0x0) 17:50:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x27, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x70040000}, 0x0) 17:50:50 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:50 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x300}, 0x0) 17:50:50 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000280)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000480)="ff0f000056", 0x5}], 0x1}, 0x20000000) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1, 0x0, 0x0, 0x1100}, 0x6d70) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x8a, 0x0, 0x1, 0x0, 0x6, 0x8103, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x5}, 0x9000, 0xb, 0x0, 0x4, 0xff, 0x101}, 0x0, 0x0, r2, 0x2) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid_for_children\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000040)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000240)) openat$cgroup_ro(r1, &(0x7f00000003c0)='pids.current\x00', 0x0, 0x0) 17:50:50 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0xffffff1f}, 0x0) 17:50:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x9effffff}, 0x0) 17:50:51 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000280)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000480)="ff0f000056", 0x5}], 0x1}, 0x20000000) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1, 0x0, 0x0, 0x1100}, 0x6d70) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x8a, 0x0, 0x1, 0x0, 0x6, 0x8103, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x5}, 0x9000, 0xb, 0x0, 0x4, 0xff, 0x101}, 0x0, 0x0, r2, 0x2) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid_for_children\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000040)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000240)) openat$cgroup_ro(r1, &(0x7f00000003c0)='pids.current\x00', 0x0, 0x0) 17:50:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x2}, 0x0) 17:50:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0ffffff}, 0x0) 17:50:51 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x18, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x3}, 0x0) 17:50:51 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000280)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000480)="ff0f000056", 0x5}], 0x1}, 0x20000000) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1, 0x0, 0x0, 0x1100}, 0x6d70) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x8a, 0x0, 0x1, 0x0, 0x6, 0x8103, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x5}, 0x9000, 0xb, 0x0, 0x4, 0xff, 0x101}, 0x0, 0x0, r2, 0x2) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid_for_children\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000040)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000240)) openat$cgroup_ro(r1, &(0x7f00000003c0)='pids.current\x00', 0x0, 0x0) 17:50:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfcffffff}, 0x0) 17:50:51 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x19, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x4}, 0x0) 17:50:52 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:52 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1a, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfffff000}, 0x0) 17:50:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x29, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x8}, 0x0) 17:50:52 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c40)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44825cc4f142133d4a1cac53819fda7ffe332b0d27517495db22c369fc01b191513df23e4a10cbd4dfb403d82acd600312817f2b17e678d15e020912aa8ef860dd81e221f886dc0154419e857178e246297048629c6326bfb9ff34fedbb2ca4d35f6b5f65e8894425d22dce799b0a5d65dee16bffed85ac530e49bbe2cc6e0743c03aa6c636e4b0d78e3d530d91e8213cc3f3aa07295e86df0557be41f4f982eb553b1b9e36d77174f29c57c0db60076f5ab323325dbfa90e0eda33ddb5ed8fa984bb0fcb52ad14988f58de2ec276e5d9d9464ede6deb474604da2941b7d924c96d8c04e5ff44ca849a436284bc99d4b03487b4c221a26c27228aea193cb831124187765d3c1b162bd4e64b2ca92c22afa1ecff1edecd4de1e8d2c88b2b03ad75e3774a70363ad121331b0988b9fa3fd3bdd1f48369863e3c2bc37067a1fe90d7cc733eb753fc3fbe8fa03ed9c061732486e68b39e02a63cbff4af35dd8a17dd33df000200000000000088d1f4c11a77b295a8ed9374cb784e9afcfd3089a7aeee471c050658a0171c884851b6f00b359d41dce0240f5aaa9e037891216b4c02291f122c51c1e3291195615f13acdbe142541ba3ba10abca64f1cb9d9c819422bf2cf04699902d8e19a9ba1afc6edc2e615a527698f2f84fec03800c18f1731575893bafb7acbe7c5eb1ae1576f0e7e88e57dc1c3f7639768e84dda015f8fa1ecfba22adf4285a7b6ccf4b17ce6e26b345f1cbc0b16312ec7fc71724fcde39982c720fbad55be728acdc4acb8ce2a396662e5d6da34c6fc3bf21e7f2f9c1916f77d6db064ab7ba34debf9fd2d0dd40b341afc6a1be00d1910c024351e926f30153cadfbeb9110ff0696fde63973c0a1d85e37c34d1842d50af6e53ec269554a765414221200100000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2fd, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030700009e40f088641fffffe103004000638477fbac14143fe0004301c699da153f08a0e6e380f6010af683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x5b00}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x8, 0x74, 0x1f, 0x0, 0x1, 0x800, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x711, 0x4, @perf_bp={&(0x7f0000000540)}, 0x12364, 0x7fffffff, 0xfffffff7, 0x8, 0x1, 0x3, 0x101}, 0x0, 0x4, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x7, 0x0, 0xb8, 0x9d, 0x0, 0x0, 0x88400, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0x8}, 0xa011, 0x0, 0x8, 0x0, 0x8c00, 0x7, 0x3ff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r0, &(0x7f0000000380)="4dbe2e47513e13b56e3f730e34c9c7e7eb4c4d258434650ad6", &(0x7f0000000400)=""/111}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000580), 0x1}, 0x49381, 0x5, 0x0, 0x0, 0xfffffffffffffeff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r2, 0x0, 0xfffffffffffffddf, &(0x7f0000000680)='gte0\x00M[m\xa3\xd3<\x7f\xbd\fj@[8\xb8\xb1\xe1\x8b2\x89aR\x8f\xa1\xbbjG\xc032\x13\'%ik\x04I\xbe\x90\xd1\xb5Z\xe3\xfd\xde$\xf8v\xdc]\x88\xdc\xa9\xc6\xf9\b`:wR\xd4cw\xf7\x1e\x94\xa4\xff\x9e\xb8Yj\x97\x8b\xcd\x80\x1asB*\x19\xe2P\xaa\x15\xe2\b\x16\x06!\xea\x83\x16\x00\x00\x00\x00\x00\x00`\xaa\x92dk\x06\xb1M=\xdf[\x00\x1c\xaa\xad\xb4K7/a\xc2\x0fk\xcc#\xa3\xa0\xed\x87\x17\xd6z\xa2\xac\x1c\xba\xc1\x031|\xb1\xab\x96l\x17~\xe4!\xa8\xf3B\xd7m\v\x8bD \xc2\xca\xfa\x7f?M\xbab', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={r3}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r3}, 0xc) 17:50:52 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xffffff7f}, 0x0) 17:50:52 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1b, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x9}, 0x0) 17:50:52 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xffffff9e}, 0x0) 17:50:53 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xe}, 0x0) 17:50:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfffffff0}, 0x0) 17:50:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x2a, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:53 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1d, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf}, 0x0) 17:50:53 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfffffffc}, 0x0) 17:50:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xa7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000240)={0x0, 0x0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001200)}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x12000005f) close(r0) 17:50:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x60}, 0x0) 17:50:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x40030000000000}, 0x0) 17:50:53 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1e, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:53 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0}, 0x0) 17:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 17:50:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x2b, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:54 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x21, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:54 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xa7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000240)={0x0, 0x0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001200)}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x12000005f) close(r0) 17:50:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x2be}, 0x0) 17:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x100000000000000}, 0x0) 17:50:54 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x22, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x300}, 0x0) 17:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x200000000000000}, 0x0) 17:50:54 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x900}, 0x0) 17:50:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x300000000000000}, 0x0) 17:50:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x2c, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:50:55 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xe0, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:50:55 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x400000000000000}, 0x0) 17:50:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d00)='cgroup.controllers\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg(r1, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="100000000000000500000000000000122d9f6faa2d34a8c8d2c3345224"], 0x10}, 0x0) close(r1) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000400000018000000fea2c3db4c0502000000ff00003a0d0000ad81000004000000950000000000000083af9e1bb053ffc090c2eac920baf98f8c09462a2f9490f0e99f7f6a0805f3714174a30ec6a6408a22a75e8d835e6399bf2f700eaef19e9a41537896b4f538624b9a96dbd55f77c813eb4b1137d914ea41541886bada90644bfd206d4bcfa2bcfa868b0f9f30b57f1be3dc5e512ebbb5a18c1172328d156f80e45983d6"], &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x81, &(0x7f0000000240)=""/129, 0x40f00, 0x1e, [], 0x0, 0xc, r0, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x9, 0xe, 0x5, 0xec}, 0x10, 0x0, r0}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x2b, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000380)="2e00000014008501000000000000002e0a0a00e22c000000160001808eb3d81fc77948f328995a017c7b58510600", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000ac0)="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"/283, &(0x7f0000000480)=""/184}, 0xfffffdeb) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x541b, 0x743000) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000001c0)={'veth0_to_bond\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@exit, @jmp={0x5, 0x1, 0xa, 0x1, 0x6, 0xfffffffffffffff4}]}, 0x0, 0x10000, 0x8a, &(0x7f0000000240)=""/138, 0x40f00, 0x0, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="18200000", @ANYRES32, @ANYBLOB="0000000000080000950000000000000095000000000000009500000000000000a700080000000018220000d3cb770ab382714006442d81829757c36e0d0ba32c5785ffe99cb4d5414aca4e401858b93e60a267a35effcfd4ee9794eaf84f84f14fc1156a26611aa4c8a9a2974a68ae01fed47e2ff197ec9d3724f1c354982c", @ANYRES32, @ANYBLOB], &(0x7f0000000580)='GPL\x00', 0x0, 0xc8, &(0x7f00000005c0)=""/200, 0x41000, 0x1, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 17:50:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x800000000000000}, 0x0) 17:50:55 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x900000000000000}, 0x0) 17:50:55 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:50:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xe00000000000000}, 0x0) [ 508.794409][ T7] device .0 left promiscuous mode [ 508.912268][ T7] device .1 left promiscuous mode [ 508.982884][ T7] tipc: TX() has been purged, node left! [ 511.104621][ T7] device hsr_slave_0 left promiscuous mode [ 511.113298][ T7] device hsr_slave_1 left promiscuous mode [ 511.119827][ T7] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 511.129027][ T7] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 511.136577][ T7] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 511.145366][ T7] device bridge_slave_1 left promiscuous mode [ 511.153658][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.161962][ T7] device bridge_slave_0 left promiscuous mode [ 511.168119][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.182932][ T7] device veth0_macvtap left promiscuous mode [ 511.188965][ T7] device veth1_vlan left promiscuous mode [ 511.195202][ T7] device veth0_vlan left promiscuous mode [ 514.061415][ T35] Bluetooth: hci4: command 0x0409 tx timeout [ 515.393066][ T7] team0 (unregistering): Port device team_slave_1 removed [ 515.407860][ T7] team0 (unregistering): Port device team_slave_0 removed [ 515.420472][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 515.439058][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 515.504342][ T7] bond0 (unregistering): Released all slaves [ 515.593353][T20420] IPVS: ftp: loaded support on port[0] = 21 [ 515.709547][T20420] chnl_net:caif_netlink_parms(): no params data found [ 515.813832][T20420] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.820965][T20420] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.830199][T20420] device bridge_slave_0 entered promiscuous mode [ 515.840267][T20420] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.848052][T20420] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.857035][T20420] device bridge_slave_1 entered promiscuous mode [ 515.889060][T20420] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 515.902759][T20420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 515.945463][T20420] team0: Port device team_slave_0 added [ 515.954444][T20420] team0: Port device team_slave_1 added [ 515.980899][T20420] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 515.989093][T20420] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 516.015999][T20420] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 516.037859][T20420] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 516.045375][T20420] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 516.075815][T20420] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 516.114317][T20420] device hsr_slave_0 entered promiscuous mode [ 516.123518][T20420] device hsr_slave_1 entered promiscuous mode [ 516.130224][T20420] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 516.139061][T20420] Cannot create hsr debugfs directory [ 516.145061][ T2470] Bluetooth: hci4: command 0x041b tx timeout [ 516.287709][T20420] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.294825][T20420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.302280][T20420] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.309356][T20420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.389463][T20420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 516.409813][ T2589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 516.419206][ T2589] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.430602][ T2589] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.449717][T20420] 8021q: adding VLAN 0 to HW filter on device team0 [ 516.477471][ T2589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 516.487185][ T2589] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.494332][ T2589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.511871][ T2589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 516.520354][ T2589] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.527503][ T2589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.558322][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 516.586530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 516.596385][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 516.606820][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 516.616604][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 516.629511][T20420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 516.659189][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 516.668026][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 516.686608][T20420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 516.829623][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 516.847680][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 516.898248][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 516.909995][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.932818][T20420] device veth0_vlan entered promiscuous mode [ 516.941403][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.949221][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 516.964650][T20420] device veth1_vlan entered promiscuous mode [ 516.999875][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 517.009865][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 517.019808][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 517.030695][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 517.045555][T20420] device veth0_macvtap entered promiscuous mode [ 517.058626][T20420] device veth1_macvtap entered promiscuous mode [ 517.134707][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.151199][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.161012][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.182824][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.200302][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.222678][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.233776][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.245380][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.256070][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 517.267447][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.279947][T20420] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 517.290160][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 517.300223][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 517.310365][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 517.320185][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 517.342515][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.365500][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.383050][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.405529][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.420250][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.441822][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.459352][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.470628][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.493258][T20420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 517.511357][T20420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 517.532228][T20420] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 517.543049][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 517.557525][ T2470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 517.743652][ T80] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 517.761800][ T80] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 517.776643][ T2660] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 517.838254][ T9261] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 517.860843][ T9261] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 517.871397][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:51:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xe00}, 0x0) 17:51:05 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xffe0, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0x11fffff9f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0xda, 0x18, &(0x7f0000000280)="3819ef312ea3237338f05823ab812643925981713802bc3e3491d951eb361d9d0cfe7f66467e8cbd61211666597de48cedf98b505ca86d0a880b34d240725b5487efd1a3f23438715a9eee52ee19cbcb5fa387b53d66ecdef90a6fdee361294c557946bb608a3fe537c333992891db0f376c72033955de36463fe39c7a7df75c4b0ec9ea7cdc4ea51737e0d89e46863b4889d39b0ff7e5dcf9b0896977eae544dc94041fb061b2ff73a5f94b371aebc0c6fd1a393dc12f7da56e86394c5e4a7ebbd0717b0bd3f27f83de3535f8d932583dbc5270f881bdcefa49", &(0x7f0000000140)=""/24, 0x1, 0x0, 0xf2, 0xe0, &(0x7f0000000700)="789548d5e39e4d9aea12adea1bed188e77dda2aa14b18c3dd948210b84520af52ae2d4796c3bb62329e5a5f5056ea421ff5859b5db62b7e638974c2478bb4511d7cd782d72adcbe92996e260d39a4a07f9e9a086f64e2168d7f1a2d3d047ffc911ae571b30ddf656a6637f294ec6cd62de955eca029bbd755793f7265aa3d0e78c726aaafc1aac963d32a0d11f2417f5fd1e83a3497b084bcf47283042f5548257e99d9e79222bb21b11b2ae46da619f8907152548aa8d520dfd6f45e93c2e3ab4524a2c7475ed2498245b31b9c44f087a3c58241c78de0f36b5e871a7ffe16796c0050177e7d85690ed998888a640b3ac43", &(0x7f0000000800)="df5f231a7213d29bc967fdb93cb9e61e3370c80aad706fce0f333f69692c2f2d55dc40cd14118ed8f4cf8dbb452542e22277e04e30c5feef3031c5563eecc739defb1d27c363d4f769b4e90f2f835667d0cc43f2c796bfad1b75d3fac3b8e2b7741b961ea517ee84a62b484c281bc3187b899cd0f3eb3bdc83766f81e98a0a56b1cc9fcb863eb7433df8fc05010897ba5bbf69f77ed78980db1508ea48b19e3bd66c97cd5ad0accf9e8a5d738adbe5c55fe262c8b4d3152ace45b02ac5f425aaadf46c257665399d187e53d4c27970c436fc7c6bd8c8cee970f26ba0a0304337"}, 0x40) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x70, 0x0, 0xe8, 0x0, 0x3, 0x0, 0x0, 0x409, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x24, 0x0, 0x3f, 0x0, 0x7, 0x77ff, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)='memory.events\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x34f, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0xffffffffffffffc0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) 17:51:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf00000000000000}, 0x0) 17:51:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x2d, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 518.221544][ T35] Bluetooth: hci4: command 0x040f tx timeout 17:51:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x6000000000000000}, 0x0) 17:51:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:05 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xffffffe0, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf00}, 0x0) 17:51:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xe430, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000000500)={&(0x7f0000000240)=@phonet={0x23, 0xa, 0x2, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18, 0x1, 0x3d, 0x470}}], 0x18}, 0x48080) r1 = bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f00000004c0), &(0x7f00000005c0)=""/4096}, 0x20) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000080)={'veth0_to_bond\x00'}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, 0x80, 0x0}, 0x8000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000040)) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'rdma'}, {0x2d, 'io'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'cpu'}, {0x2b, 'cpu'}]}, 0x1e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="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"/657], 0x258}, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 17:51:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x7004000000000000}, 0x0) 17:51:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x6000}, 0x0) 17:51:06 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xffffffffffffffe0, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 17:51:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r0, r1, 0x25, 0x2}, 0x10) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0x0, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) r4 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305839, &(0x7f0000000040)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r3, r4, 0x0, r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xfffffe23, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) socketpair(0x1, 0x80801, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={r6}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000580)='ip6_vti0\x00') 17:51:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x2e, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:06 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xbe02}, 0x0) 17:51:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 17:51:06 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2e0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)=0x2e8, 0x12) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000740)={&(0x7f0000000300)="3f954e41c67786914f79e68da74e5d8f2daa62b3c8961dea87f77fe2a101d7ad12e8cc662751c6ed88b5907f9f7dd8ae8b25731d599454990b34d2edc5b4c0ec617310a85501d07aae986170a21918327db4fd565da61fd65eb3f87f87d31fb94058", &(0x7f0000000400)=""/23, &(0x7f0000000680)="87b1088e9a100ddedc6dd72a62bac25bac9c7e602889ea73f37781bb43e5cbddb8c2376e585fcce575113c132645f3430eb6ff7c40b300", &(0x7f00000006c0)="22c027ddfb931d32fe865d86725bd44a5c927aa9584c1931e9e1ca5872b7b77c84095547f4f615c2d82b0a19b8bc6fa3f3a4ab868d616d46f515f12c5def7c631081321a1c71c5259c8f27f47b2bda0d00cbf8158dc92e24213d7ee25d2bf193743441e5ac85fabd98", 0x0, 0xffffffffffffffff, 0x4}, 0x38) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xa592, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000015c0)}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() gettid() r3 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x80000000, 0x2000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x438, 0x6, 0x0, 0xfff, 0x0, 0x1}, r2, 0x0, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x5, 0x2, 0x3f, 0x4, 0x0, 0x8c1a, 0x43010, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x4, 0xe1}, 0x4, 0xc5f, 0xd4c3, 0x6, 0x6, 0x77a0, 0x4}, r2, 0x8000010, 0xffffffffffffffff, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x2) perf_event_open$cgroup(0x0, r4, 0x4, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x1, 0x4e, 0x1, 0xfd, 0x0, 0x7b8, 0x20080, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x18008, 0x44, 0xe0000000, 0x4, 0x80000001, 0x0, 0x3}, r2, 0xb, r1, 0x8) sendmsg$kcm(r0, &(0x7f0000000840)={&(0x7f0000000380)=@in={0x2, 0x1400, @dev}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xb80b0048}, 0x6c) 17:51:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfcffffff00000000}, 0x0) 17:51:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf000}, 0x0) 17:51:06 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) 17:51:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x34000}, 0x0) 17:51:06 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x2f, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:07 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) 17:51:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x400300}, 0x0) 17:51:07 executing program 2: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000005c0)={0x5, 0x70, 0x6, 0x62, 0x2, 0xff, 0x0, 0x100000000, 0x12021, 0xe, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x0, @perf_config_ext={0x8001, 0x9}, 0x80, 0x72c1, 0x1, 0x9, 0xfffffffffffffffc, 0x3004, 0xff80}, 0xffffffffffffffff, 0x8, r0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000640)=0x4) r2 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r2, &(0x7f0000000180)={&(0x7f0000000080)=@isdn, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/34, 0x22}], 0x1}, 0x40000000) r3 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000003c0)="1600c9a573dd37aa66663502001a0081aee4050c0000", 0x16}], 0x1}, 0x0) socketpair$unix(0x1, 0x7e4edfd699e5af04, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000580)={&(0x7f0000000300)=@ipx={0x4, 0x6, 0xffffff66, "0076a1ad38de", 0xfe}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000400)="f0f5ab36e034a7e0bb7c1d1555d703d81ba7c801668c83c026936ef3fe15508980efece5addee76649c3e4a794d014211c022c248d6756010f21cece53e1b2aea36b76c55d013ec59baeb0c561634c25cb9995646dd61cc4af85277a3d49f7929ff03f890f0672e83a580cbb7f6ca5716d82e9cf9796e15c0f98313571937a44e4b497c45286ec944dabd221372c17827234b022590432ec5c8f900fd682c7c2a3b7d6a736920658eb58e002d3e8574dfeb31ce77a1c3ba66cf4222b84c6a6d4c5e6af591e356011c9ec59470198d7aabdbe555686f91a2df2cd58990cc193309a8efd", 0xe3}, {&(0x7f0000000500)="c72b94278c15a383c24194a1e426d92cbe5524039071020e54cbaf544ec1714c8ab4959bd8c293297b850719812998c28312ec097e416c141c26f25953d4a17b535363", 0x43}], 0x2}, 0x40000d0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x2, 0x70, 0x7f, 0x3, 0x6, 0x4, 0x0, 0x1, 0x2, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x7, @perf_config_ext={0x7, 0x7}, 0x40000, 0x2, 0xd555, 0x9, 0x6c00000000000000, 0x3, 0x6}) 17:51:07 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:51:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0ffff}, 0x0) 17:51:07 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) [ 520.301532][ T7878] Bluetooth: hci4: command 0x0419 tx timeout 17:51:07 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x20000391, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:07 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x2}, 0x0) 17:51:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x30, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x1000000}, 0x0) 17:51:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x3}, 0x0) 17:51:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:08 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:08 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x4}, 0x0) 17:51:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x2000000}, 0x0) 17:51:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x3c, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a000000000704eb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = getpid() r2 = perf_event_open(&(0x7f0000000500)={0x6, 0x70, 0x2b, 0x4, 0x8, 0xbf, 0x0, 0x3, 0x42, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x4}, 0x1410, 0x0, 0x7ff, 0x6, 0x3, 0x81, 0x6}, r1, 0x9, r0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000050}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000003780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)=@sco={0x1f, @fixed={[], 0x12}}, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x11, 0x3, 0x300) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) sendmsg$sock(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="a0", 0x1}], 0x1}, 0x2000a844) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) 17:51:08 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x2, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab025"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x31, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x3000000}, 0x0) 17:51:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x8}, 0x0) 17:51:09 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab025"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:09 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x3, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x9}, 0x0) 17:51:09 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='spmi_write_end\x00', r0}, 0x10) 17:51:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x4000000}, 0x0) 17:51:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab025"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:09 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x4, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xe}, 0x0) 17:51:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x32, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1}, 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x2, 0x10}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r2 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)="f52d6730e7490de00f789c97943f8a3d8d086c9b1a576ab7af", 0x19}], 0x1, &(0x7f0000000b00)=[{0x1010, 0x105, 0x9, "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"}], 0x1010}, 0x8000000) sendmsg$kcm(r2, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) recvmsg$kcm(r2, &(0x7f0000006340)={&(0x7f0000004e00)=@can={0x1d, 0x0}, 0x80, 0x0, 0x0, &(0x7f0000006300)=""/27, 0x1b}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x86, 0x5, 0x1, 0x2, 0x0, 0x7fff, 0x50440, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x2811, 0x2, 0x8, 0x1, 0x4, 0x2}) bpf$MAP_CREATE(0x0, &(0x7f00000065c0)={0x6, 0xce, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x301, [], r3, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x40) 17:51:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x8000000}, 0x0) 17:51:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xf}, 0x0) 17:51:10 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x5, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) 17:51:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x9000000}, 0x0) 17:51:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xf0}, 0x0) 17:51:10 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x6, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xe000000}, 0x0) 17:51:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x33, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:11 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = socket$kcm(0x2, 0x1, 0x106) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, 0x0, 0x0) 17:51:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x300}, 0x0) 17:51:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf000000}, 0x0) 17:51:11 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x7, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x6}, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfb, 0x3f, 0x90, 0x20, 0x0, 0x3, 0x4012, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0xd}, 0x2776, 0x2, 0x4f7, 0x0, 0x2, 0x7d4, 0x1}, r2, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7f, 0xff, 0x7, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='freezer.state\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000100)='net_prio.ifpriomap\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xa592, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000015c0)}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)) close(r0) 17:51:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x470}, 0x0) 17:51:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x60000000}, 0x0) 17:51:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x900}, 0x0) 17:51:11 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x8, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x34, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x9effffff}, 0x0) 17:51:12 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000580)=""/134, 0x86}, {0x0}, {0x0}], 0x3}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x5, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x2d}, @jmp={0x5, 0x0, 0x7, 0x8, 0x3, 0x8, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd61}], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff6, &(0x7f00000018c0)=""/4086, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0x780, 0xc2, &(0x7f0000000840)="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", &(0x7f0000000380)=""/194, 0x0, 0x0, 0x8, 0xdf, &(0x7f0000000040)="24aedc5f07edcf63", &(0x7f0000000480)="bfd228ac60619eee330f26c9578d624f44648f7b4dbe28a2b63b9b40a01c5f7b12440fa1965374e4defb0dc2b9264e86a1401eedb7f4384cf485f540d78e5490d9f10d15af0dd33442e37fd5bcb05f899da6aa980bbba3083c3501cfa23e4c74b8b1ecc4c44808e106219226919294dc94fa6bff9462d5e31c90c0e2fb65723f94a6bb66a4c0a1f6b758929d310a12ff3c0a675206160ad582ed73b5e3bd2718edd5876eb0d2136abb540e3a4fba6b7048e665eb9cb80c82d6c5a13389aa89d79251e957d67b6cc767e18b1b8d29a3e4d7ad29f266e8e6cefb21f56a5392ff"}, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800, 0x0, 0x3, 0x9, 0x9a}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400c00) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003780)={0x0, 0x0, 0x0}, 0x40002320) 17:51:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 17:51:12 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 17:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xbe020000}, 0x0) 17:51:12 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:12 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x60, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0ffffff}, 0x0) 17:51:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 17:51:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x35, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:13 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x0, 0xa0, 0x0, 0x140, 0xffffffffffffffff, 0x9c, [], 0x0, r1, 0x0, 0x0, 0x3}, 0x40) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x1f, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x2e5}, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB='\n'], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x7, &(0x7f00000002c0)=""/7, 0x0, 0xa, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r3 = socket$kcm(0xa, 0x0, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="1dcb12b5715bd846c340b090bc872ecd4f159c37675718774a3840558b552e5bed3ff6ff6097a626f68ba7e7eb117dfa47636989685b4c6cd75587f8b370b3f7280c7b139a675b2a91633607047e7252f23d41c981cfe4b6b71564f23c3c5b623f422ce534ad676d72f70b13d7e1ffd436ee58803b189907bdd5b815426d355eca326e96a334c03f7661671f3b468ec1e494c3c5dbdc66c3d38b50f812a97a79bc4ec2d87dca6ac13cb5106cf88593a2246c461015ad78aa53d98286c1177a543bf124af9d68633768f8ca87f31a0ff440208bcba4a695aa24f78f98a2978646311992fe9a4e5694b7977d4d596baf"], 0x12) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000480)=""/159, 0x9f}], 0x1, &(0x7f0000000540)=""/76, 0x4c}, 0x20010123) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 17:51:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x7004}, 0x0) 17:51:13 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xe0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfcffffff}, 0x0) 17:51:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfffff000}, 0x0) 17:51:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 17:51:13 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) [ 526.346555][ T27] audit: type=1804 audit(1601142673.615:73): pid=21013 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir161320885/syzkaller.80PAPX/455/memory.events" dev="sda1" ino=16379 res=1 errno=0 17:51:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xffffff7f}, 0x0) 17:51:13 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xf0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 526.662752][ T27] audit: type=1804 audit(1601142673.935:74): pid=21007 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir161320885/syzkaller.80PAPX/455/memory.events" dev="sda1" ino=16379 res=1 errno=0 17:51:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x36, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:14 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 17:51:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xffffff9e}, 0x0) 17:51:14 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002740)={0xff, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xffffdfff, 0x57}}, &(0x7f0000002780)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x832}, 0x74, r0}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet(r1, &(0x7f0000002700)={&(0x7f0000000100)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000002680)=[{&(0x7f00000002c0)="d6d9f09ec821ff28753625913cd516231db084167bcc840e2c7ba20f41c1f79e305e1528cca6d38d3efb6a0651e68385f7342819e0da9dc6b361146ca7ea7c35e914e9ae2482109a84ecadc0e52cc472aa9551f5e78185dc9f14d5f5ae3665b0aa6e1a948a695eee4a7b79e1b2f1be6288b392", 0x73}, {&(0x7f0000000340)="ade68963f0165aceb470edfc1521b835bb2bb07a9e5d24a26d78d41bd101c162e70371d9564f5e71ef9e3fcb502b42de1964f461ff643787482de1e6a930d10c6098953e92330c315720889800cdf1ca3752cac32661f5bb9ca1428cb7469ca386396ae0689bd720a8288acbe1661b753712223040e3218c09fae02e38280ff32fc4714fcc265aa808a55ae1f7fa90bc0e74836522f6762739fac8dddad77bace02b63084bf9939098949e712bb8d17428607028c3116c6e31c8e5f78a55d5182f8f8372254c57f54db0ff4d4d7157a503c472fb6e0c472120", 0xd9}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="466d62e8352957be7ee89c11776a98b4145842f08224b9292e19bcb4d36311a6c7811d5a746e52353ce06532d47037d76e7ce1b23dfa8caffeeea5fc9db7df7b1edaf6db76237438f6a1d663c3fcf8004172676677586df2620affb4d5f4a99f84174c151e9c006510207a59457b163cd8da3be91411912ea1f4ad2e3cb0001dc017b3d452feff8cef2a938a0989799c8b", 0x91}, {&(0x7f0000001500)="3c8d3f9c1ad8d771341bc5e6d3b7ef780d0d199e00eebaf9bb03689d6d2f2450ed9ad51973d3807b9a7d33fef6da05abccaf16f9a45981f76d4828458639d8f7efd1ab394e2874735dddbd839e84c466b9581d85fcaac1a77e9a89d6849c63c3074a5d68829d6fd05abe00eb5276b2f5c17b3ef73f88e8ae7b7dbba0406fa8abed71fd9ef82c3f62d46af7b9c93ab797a0df1a40e872e99bdb0e10d99eabda549374de055b3a9bb30dfa3487e50a19df8f84141fff93a43f790c0e4005cadf1bb912a5106ea5c6cb792756922e31bb46c9395ff1efd6c17e2001a57908129507267de582e6ef0c1633e799d870830181926f", 0xf2}, {&(0x7f0000000240)="64c35aea3dc558501317c956c15ae3e751", 0x11}, {&(0x7f0000001600)="d7aab63c5bf55bd5e540be47f4977666c032e5ee2924fc6dc670f09564e929c5d0b1521074aefd4c2a72d1b4a98bee8894d03f786f108ee7fee24e7fb93a1bf221d867cb364cc0aca68dc4280edf1b2122b2f31482aae3926def27097d496b2ef6d641f2896f05e046980294bfdf0f5e11e59203eacd06653833aa048a64", 0x7e}, {&(0x7f0000001680)="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", 0x1000}], 0x8}, 0x4001) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:51:14 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xfe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 17:51:14 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xde, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x1769f) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0xb9, 0x8, 0xca, 0x7, 0x0, 0x6366688c, 0x200, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040)}, 0x401, 0x0, 0x3, 0x1, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x57}, [@call={0x44}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 17:51:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfffffff0}, 0x0) 17:51:14 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 17:51:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfffffffc}, 0x0) 17:51:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x37, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:15 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xde, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x1769f) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0xb9, 0x8, 0xca, 0x7, 0x0, 0x6366688c, 0x200, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040)}, 0x401, 0x0, 0x3, 0x1, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x57}, [@call={0x44}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 17:51:15 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x2c3, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 17:51:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x40030000000000}, 0x0) 17:51:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 17:51:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) 17:51:15 executing program 2: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)='}.-\x00'}, 0x30) r1 = socket$kcm(0x10, 0x2, 0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000003c0)={0x4, 0x70, 0x7f, 0x2, 0x3, 0x0, 0x0, 0x3, 0x10400, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x4, 0x67}, 0x88, 0x2, 0x140, 0x3, 0x4eb0, 0x8, 0x6}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x9, 0xbc, 0x6, 0x5, 0x0, 0x1, 0x40040, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x3, 0x3ff}, 0x6002, 0x3f, 0x4, 0x5, 0x1, 0x1}, r0, 0x5, r3, 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40305839, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000280)=r6, 0x4) openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_type(r4, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='net_prio.prioidx\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="4c000000150041f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6e74703c48f93b82a0000000000000000a5e54e0000000300000000", 0x41}, {&(0x7f0000000300)="4d999e6effc4548cbffb2f", 0xb}], 0x2}, 0x0) 17:51:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x100000000000000}, 0x0) 17:51:15 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x300, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x38, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 17:51:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x200000000000000}, 0x0) 17:51:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001c00)}, 0xec93, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6}, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xe, 0x2, &(0x7f0000000240)=@raw=[@generic={0x8, 0x8, 0xe, 0x400, 0x8b56}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000280)='syzkaller\x00', 0x200, 0x0, 0x0, 0x40f00, 0x6, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x6, 0x85, 0x80}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000400)={0xffffffffffffffff, r0, 0x0, r2}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x6, &(0x7f00000000c0), 0x1) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) close(r0) close(r1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)=0x23) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'virt_wifi0\x00'}) 17:51:16 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x500, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) 17:51:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x300000000000000}, 0x0) 17:51:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:16 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x600, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x9000000}, 0x0) 17:51:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x400000000000000}, 0x0) 17:51:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x39, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) 17:51:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x800000000000000}, 0x0) 17:51:17 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44825cc4f142133d4a1cac53819fda7ffe332b0d27517495db22c369fc01b191513df23e4a10cbd4dfb403d82acd600312817f2b17e678d15e020912aa8ef860dd81e221f886dc0154419e857178e246297048629c6326bfb9ff34fedbb2ca4d35f6b5f65e8894425d22dce799b0a5d65dee16bffed85ac530e49bbe2cc6e0743c03aa6c636e4b0d78e3d530d91e8213cc3f3aa07295e86df0557be41f4f982eb553b1b9e36d77174f29c57c0db60076f5ab323325dbfa90e0edab3ddb5ed8fa984bb0fcb52ad14988f58de2ec276e5d9d9464ede6deb474604da2941b7d924c96d8c04e5ff44ca849a436284bc99d4b03487b4c221a26c27228aea193cb831124187765d3c1b162bd4e64b2ca92c22afa1ecff1edecd4de1e8d2c88b2b03ad75e3774a70363ad121331b0988b9fa3fd3bdd1f48369863e3c2bc37067a1fe90d7cc733eb753fc3fbe8fa03ed9c061732486e68b39e02a63cbff4af35dd8a17dd33dfa196911b654e60fa881a77b295a8ed9374cb784e9afcfd3089a7aeee471c050658a0171c884851b6f00b359d41dce0240f5aaa9e037891216b4c02291f122c51c1e3291195615f13acdbe142541ba3ba10abca64f1cb9d9c819422bf2cf04699902d8e19a9ba1afc6edc2e615a527698f2f84fec03800c18f1731575893bafb7acbe7c3eb1ae1576f0e7e88e57dc1c3f7639768e84dda015f8fa1ecfba22adf4285a7b6ccf4b17ce6e26b345f1cbc0b16312ec7fc71724fcde39982c720fbad55be728acdc4acb8ce2a396662e5d6da34c6fc3bf21e7f2f9c1916f77d6db064ab7ba34debf9fd2d0dd40b341afc6a1be00d1910c024351e926f30153cadfbeb9110ff0696fde63973c0a1d85e37c34d1842d50af6e53ec269554a765414221200100000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x10, 0x5, &(0x7f00000007c0)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2fd, 0xef, 0x0, &(0x7f0000000500)="b95b03b700030700009e40f088641fffffe103004000638477fbac14143fe0004301c699da153f08a0e6e380f6010af683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b335ba20ef706e48b35bb01f895868a3d635804bba75c44df371e1785b9f20c50c3f2d9100be2293144c5d60015fa3be623c36791aa98b5a6276761162b6668dabbeff8bf9c6d987279fa1b63f5504e37146e549571bb700fae484a0116438ca6fe6e450c07ac4637d0a019df4bd233f76f7fd5601c8ca99a32b8d789843baeeff8717f0b3ddcbd", 0x0, 0x1fd, 0x5b00}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r0, &(0x7f0000000380)="4dbe2e47513e13b56e3f730e34c9c7e7eb4c4d258434650ad6f7611e7fe16b3b8290c1f9ba8b51aec9692bbb31e69559fe7199d7e1f7c4", &(0x7f0000000400)=""/111}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) r3 = perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xff, 0x2, 0x3f, 0x3, 0x0, 0x37c, 0x80081, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x4584, 0x6}, 0x86c2, 0x8c, 0xffffffec, 0x6, 0xa, 0x2, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) 17:51:17 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x700, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 17:51:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x900000000000000}, 0x0) 17:51:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 17:51:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xe00000000000000}, 0x0) 17:51:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x3a, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:18 executing program 2: socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 17:51:18 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xe00, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x70040000}, 0x0) 17:51:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf00000000000000}, 0x0) 17:51:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 17:51:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x6000000000000000}, 0x0) 17:51:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 17:51:18 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x2000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:18 executing program 2: socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000740)=@in6={0xa, 0x4e24, 0x0, @local, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 17:51:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x3b, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 17:51:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 17:51:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xbe02000000000000}, 0x0) 17:51:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 17:51:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:19 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x3f00, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001c00)}, 0xec93, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6}, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x6, &(0x7f00000000c0), 0x1) close(r0) close(r1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'virt_wifi0\x00'}) 17:51:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 17:51:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 17:51:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x3c, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 17:51:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfcffffff00000000}, 0x0) 17:51:19 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0x6000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) 17:51:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 17:51:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair(0x5, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:20 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x26, &(0x7f0000000000)=[{&(0x7f0000000100)="5e0000002d00050ad2279664be0000000124fc0010000b400c4162200000b83d9f63db54c67eb78a77764cb7414098f26de9036968f244ee72cf2588f2b8e348d2c2e75c", 0x86}], 0x1}, 0x0) mkdir(&(0x7f0000000140)='.\x02', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 17:51:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) 17:51:20 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xc302, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) 17:51:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x3d, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x0) 17:51:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 17:51:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:20 executing program 2: socket$kcm(0x2, 0x3, 0x2) r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="c6832de555e349b8e838b5a017da342cda68b861fd8715bf183d919646c9631a952993bcdcdcc8729e945ad7fc36303f71995b630d36e4aa8390505c95ae974c815fc7904f81f7cba34c80f9264ac9aa22fe06be9c05a63714ffe48f13c58d36feb8e0b2b2fa6eb35a01ecaf8443f0740715cecf47316f126ab8b3610c04089487cf8c4f16b35ec44d2c7c10cb91cfe35582c734103a350fcb3c93c633b41df0b875e22a849d27fb9403ca6d27a18d102b90bd527b193c36cce5cac91b59edbd81f0aed9025bec5b19d0c908bca73a1938bd334d1106d5963290e4e6f48bc150be9acb554ab0ca1fad976207dc345775e9e304dca37e52526f9d", 0xfa}], 0x1, &(0x7f0000000280)=[{0xe0, 0x109, 0x7, "9f79ac1709cb155931086a666455d7a8512cf6e7d4d6b4c2bdd5a62fc58ecad32463604bdf6c47e9755da48c17de766f3681d8fda2ec51b6366d91d5a51f2777b3b63dcbc13a60fe93870b8033cddbb55cc238badc64155076a816a383a9d8edeba8e8e2dbc06da18b6c9e068b183808eedd4f47987793952ada156f2bc79d3ccd4b33a0bd2724d037d33c53d813449ea1de845f90fb3d3fbce417b40ee7563d800d8b3630608637f699a95d775bed30b8508bb7e90cfe6ec6fabb814c32d5f27bf37421a0704ad3ae5cead43f6ea8e5"}, {0x48, 0x104, 0x4, "53c7f89da3ef2c727fdaa4337edf750db8d1658a01ac0b9421a1e1924c8f5d22dbd54572e610dfb86a2e1dcb1927b40a0a7c884f"}, {0x90, 0x88, 0x6, "7f694e5fdd48598da162a9e8d25031d990d9a39e8430bad7b4191b6d7c36326e10886ddfc347f6bee31fcaa244a5f13a54cbbeb1c3e83f53a9b2cad79ed2585bc517b4f0d61617939d9577d9d1b798412adf6178a00bbf9806283a7e28a5238737b4ff5be368e1aba683382644cfa7d206c436787c62ac48c05d9b90"}, {0x58, 0x115, 0xffffffe0, "ee5e7d86dac4e762baead651138e8e527ff21b4af6edbd36ae795c1071c9a18bba3d3a3c2dfd7275dbc98bc97da1e85d34a7d62da479df5b7de839eaf2cc6d3281"}], 0x210}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000aed2d773000703000000feffff7a0af0fff8ffffff69a4f0b27f19127c63ec32d9e0d28cff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000deb20000009500000000000000c74396c8e34049fc564e0b9cc7553358380b3a1f59916fbdf81509f07fb2ea80e5cf8dcf819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6e39f403ff065f93072aae80677eeba68562eaeae2bcd87cef90000005e69aa79e603c82caa501891595c44aa4b09d2f7b072f07707819ce25f6127a536c2356996ff278b40"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000007c0)={'geneve1\x00', @link_local}) 17:51:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x2}, 0x0) 17:51:20 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xe000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x2) 17:51:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x3}, 0x0) 17:51:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x3e, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:21 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000078f3c459cf9912338cb79d5af913fcb1698c537a48f2cc03c0916ce3ce1478c5be4600dde4d33c8ce0be0b9319ef9f5c65d7ca70b47e7ddf99a643e883e3c2798164520799bc2115d646bf19667272a34d6123f3b53b6e60275dec5f01eb9c8322af8a6d64d14466875dcf8aecfe8e00000000000000004e74be68b796f9971463b224bfc1d76950e86f009560dafbee0e0f8367e80ab02582857423bb10149a4fc54b00ce9ed89e9b8ad1fa92e64e257c11d90ee8018b0e3354c6951d4bd162a5f443b4ad41fa58d85bb3cae2086d7623a8d342786af37d468ba29176cc49c2e027daa2377e8bdbd145c5257ffc7cbf8d9ba2b7b169d400b616ba1a633a41e9c381c6c8817a7b8cc859a326c3cda9fc373aeed3dda49f62f596248fc71e1f487bef840518c0b2cb9c0cbf2b828a2c60210c77a1557b29845f211d01fc9be5f504fb8825555bd19d4d963c47d33120"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x3) 17:51:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x4}, 0x0) 17:51:21 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xe0ff, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x4) 17:51:21 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r0 = bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r2, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r2, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0xfffffffffffffecb) 17:51:21 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0xfffffffffffffecb) 17:51:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x8) 17:51:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x8}, 0x0) 17:51:21 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r0 = bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r2, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r2, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0xfffffffffffffecb) 17:51:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x9) 17:51:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x41, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x9}, 0x0) 17:51:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0xa74, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000240)}, {&(0x7f0000000380)=""/212, 0xd4}, {&(0x7f0000000300)=""/19, 0x13}], 0x3}, 0x40010000) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480e0001000000e3bd6efb440009000e00040010000000028000001201", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000a40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000900)=[{&(0x7f00000008c0)=""/35, 0x23}], 0x1, &(0x7f0000000bc0)=""/205, 0xcd}, 0x40002040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @multicast, 'macvlan0\x00'}}, 0x80, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYRESHEX], 0x418}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000b80)={&(0x7f0000000940)=@nfc_llcp={0x27, 0x0, 0x0, 0x4, 0x81, 0xff, "658f0cfabfe6cc9731bdaf56b939412a597f280a8f32a19e3d6414bd5256a12ad123ef5706b4199ad4a60f0f162e741a3a458bd4ba1849aa9d8d6a666a09e6", 0x22}, 0x80, &(0x7f0000000180)=[{&(0x7f00000009c0)="4a645a928f2fea121a75748ef1d959560dc6f67509ed77433da88fe3786d0169d57223b2599d26bcdb70aebc09aec1daae8fb9681ab6422745478162849f58c93f4a91e1c0ca5f4df1eb13f72f28113fdab17361619185ebade11c4fc7d34f220df4f8ed62", 0x65}], 0x1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="b000000000000000110000000400000037228c7de0eebb42fdfa91e85f81cdf27a07000000000000009b5a62fadec9afd9259cb939cd50b46ae04da5a4f678acb0224e3aa0e298f784aa53163bdbc8c3b47cd465fe65d98265579155fbbeaa8e9b55d848d1e0fb24fac4e9fc06a3d9dd065151eb7a26a88318ba8f483c9fef6b645abd8efa603ead02be584b7ea1f19ed64b898e85a175f450336be777cf5bce4b5d37ed8bf00c5316e49730132ff6f25cce086a6e03e5c9cc1468ae73e27e77ba2928dc93d0a765fae1ce2ea2d1cfe10b8bc6f2a692e54e12ce96b53a458eff56afe7ba14f289e17d16695c83acc0"], 0xf0}, 0x40811) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r2, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r2, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0xfffffffffffffecb) 17:51:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xe}, 0x0) 17:51:22 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xf000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0xe) [ 534.878907][T21378] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 17:51:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0xf}, 0x0) 17:51:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0xf) 17:51:22 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:51:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x60) 17:51:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) 17:51:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x42, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:22 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) [ 535.809228][T21385] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 535.824114][T21378] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 536.123070][T21410] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 17:51:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0xa74, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000240)}, {&(0x7f0000000380)=""/212, 0xd4}, {&(0x7f0000000300)=""/19, 0x13}], 0x3}, 0x40010000) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480e0001000000e3bd6efb440009000e00040010000000028000001201", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000a40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000900)=[{&(0x7f00000008c0)=""/35, 0x23}], 0x1, &(0x7f0000000bc0)=""/205, 0xcd}, 0x40002040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @multicast, 'macvlan0\x00'}}, 0x80, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYRESHEX], 0x418}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000b80)={&(0x7f0000000940)=@nfc_llcp={0x27, 0x0, 0x0, 0x4, 0x81, 0xff, "658f0cfabfe6cc9731bdaf56b939412a597f280a8f32a19e3d6414bd5256a12ad123ef5706b4199ad4a60f0f162e741a3a458bd4ba1849aa9d8d6a666a09e6", 0x22}, 0x80, &(0x7f0000000180)=[{&(0x7f00000009c0)="4a645a928f2fea121a75748ef1d959560dc6f67509ed77433da88fe3786d0169d57223b2599d26bcdb70aebc09aec1daae8fb9681ab6422745478162849f58c93f4a91e1c0ca5f4df1eb13f72f28113fdab17361619185ebade11c4fc7d34f220df4f8ed62", 0x65}], 0x1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="b000000000000000110000000400000037228c7de0eebb42fdfa91e85f81cdf27a07000000000000009b5a62fadec9afd9259cb939cd50b46ae04da5a4f678acb0224e3aa0e298f784aa53163bdbc8c3b47cd465fe65d98265579155fbbeaa8e9b55d848d1e0fb24fac4e9fc06a3d9dd065151eb7a26a88318ba8f483c9fef6b645abd8efa603ead02be584b7ea1f19ed64b898e85a175f450336be777cf5bce4b5d37ed8bf00c5316e49730132ff6f25cce086a6e03e5c9cc1468ae73e27e77ba2928dc93d0a765fae1ce2ea2d1cfe10b8bc6f2a692e54e12ce96b53a458eff56afe7ba14f289e17d16695c83acc0"], 0xf0}, 0x40811) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:51:23 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1d6d079c4d4f58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e57b3f912f6906d0aa9147e66f89a68a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6a884473845404b04bf97c0fea679c032b363956cd8bac9625879c64558212a1da04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7399423f84c6fa5f9be8173a9639a79fae885d05afe002c0e7821d406c967379e7521292d24d6c8034e2dc7c855a8945e9bce678ee9a015abc9daac8876623db563469166acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23eea1853f5cd830e2d8a49fc8f4b9276e9dc330c9cb1c5d708570a14546aa89e13c56b5a82eb9c77ef1fc324657c48a97c57580d102bf136ad9e84005e2485835861a32924f81d56ef69d85c0e7d9242c4a5df0274ec634fad105bae02aeb94ade8858caa4ed00339d317fcb8b2eb03e520281514dcb9cd80178e7420331873009f46768af3bacdd968b4d82e07c378ae84887f4f7a572b00419de81dddc474465fad30f0b5c2d4f5c1a706699d95ae03800c69852d0b788beb75acc40eea282d09fbd2a1db5ab2fd2b1bd042308d44a4e01b97456295c05326539de90867a6b66e1d8f68dd4dd6f1f3abc710b77e4d093cd6eb507741f7bb2593a373974f3c5466df9c88f46ae9eb3e31f4123a50740dbb7800e7a11c0c721420e7db3850dc067bc6b94620461968d1d04d41a9f5980b70e1e4bdcafed0c4a2ad2b31948e1cd83d85f98728079effe9f32608e5f2a6ad4061451b7ac364f86dd0cc6975237f5488cd2c0d7d27c97b44c0bb556b9f9834ac69d087618b30894c8c23348900000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xfe00, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000040)="a98143323bb12bc7547bd5f9f0387afc61dad228be23ea8421e97e3b052551b61b3fea6d80b7f032ceb1f0b7dc3117e4324879be687c4e95a93715e9ca", &(0x7f0000000380)=""/218}, 0x20) 17:51:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x43, &(0x7f0000000000)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:51:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) [ 536.412912][T21430] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 17:51:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x2be}, 0x0) 17:51:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x300) 17:51:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1}, 0x470) 17:51:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x5, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x2}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) bpf$BPF_GET_BTF_INFO(0x22, &(0x7f00000001c0)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x151}]}}, 0x0, 0x26}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x800}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0xfffffffffffffecb) 17:51:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="140000003a000511d25a80648c63940d0324fc60", 0x14}], 0x1, 0x0, 0x0, 0x300}, 0x0) [ 536.861450][ C1] ================================================================== [ 536.869906][ C1] BUG: KASAN: slab-out-of-bounds in tcp_retransmit_timer+0x2d4c/0x3240 [ 536.878147][ C1] Read of size 8 at addr ffff8880a11e2410 by task syz-executor.5/21429 [ 536.886374][ C1] [ 536.888716][ C1] CPU: 1 PID: 21429 Comm: syz-executor.5 Not tainted 5.9.0-rc3-syzkaller #0 [ 536.897414][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.907471][ C1] Call Trace: [ 536.910757][ C1] [ 536.913620][ C1] dump_stack+0x198/0x1fd [ 536.917960][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 536.923509][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 536.929064][ C1] print_address_description.constprop.0.cold+0xae/0x497 [ 536.936098][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 536.941673][ C1] ? lockdep_hardirqs_off+0x96/0xd0 [ 536.946901][ C1] ? vprintk_func+0x95/0x1d4 [ 536.951504][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 536.957058][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 536.962609][ C1] kasan_report.cold+0x1f/0x37 [ 536.967382][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 536.972935][ C1] tcp_retransmit_timer+0x2d4c/0x3240 [ 536.978322][ C1] ? tcp_delack_timer+0x370/0x370 [ 536.983384][ C1] ? lockdep_hardirqs_on_prepare+0x19c/0x530 [ 536.989399][ C1] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 536.996020][ C1] ? lockdep_hardirqs_on+0x53/0x100 [ 537.001229][ C1] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 537.007733][ C1] ? read_seqcount_t_begin.constprop.0+0x133/0x1e0 [ 537.014269][ C1] ? ktime_get+0xd8/0x120 [ 537.018634][ C1] tcp_write_timer_handler+0x79b/0xa60 [ 537.024103][ C1] tcp_write_timer+0xa2/0x2b0 [ 537.028794][ C1] call_timer_fn+0x1ac/0x760 [ 537.033388][ C1] ? tcp_write_timer_handler+0xa60/0xa60 [ 537.039029][ C1] ? msleep_interruptible+0x130/0x130 [ 537.044405][ C1] ? lock_downgrade+0x830/0x830 [ 537.049261][ C1] ? _raw_spin_unlock_irq+0x1f/0x80 [ 537.054458][ C1] ? lockdep_hardirqs_on_prepare+0x19c/0x530 [ 537.060433][ C1] ? _raw_spin_unlock_irq+0x1f/0x80 [ 537.065627][ C1] ? tcp_write_timer_handler+0xa60/0xa60 [ 537.071256][ C1] __run_timers.part.0+0x67c/0xaa0 [ 537.076374][ C1] ? call_timer_fn+0x760/0x760 [ 537.081137][ C1] ? kvm_sched_clock_read+0x14/0x40 [ 537.086327][ C1] ? sched_clock+0x2a/0x40 [ 537.090735][ C1] ? sched_clock_cpu+0x18/0x1f0 [ 537.095595][ C1] run_timer_softirq+0xb3/0x1d0 [ 537.100520][ C1] __do_softirq+0x1f8/0xb23 [ 537.105037][ C1] asm_call_on_stack+0xf/0x20 [ 537.109697][ C1] [ 537.112631][ C1] do_softirq_own_stack+0x9d/0xd0 [ 537.117648][ C1] irq_exit_rcu+0x235/0x280 [ 537.122147][ C1] sysvec_apic_timer_interrupt+0x51/0xf0 [ 537.127777][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 537.133752][ C1] RIP: 0010:_raw_spin_unlock_irq+0x4b/0x80 [ 537.139554][ C1] Code: c0 b8 6b fc 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 31 48 83 3d c6 df d3 01 00 74 25 fb 66 0f 1f 44 00 00 01 00 00 00 e8 ab 59 28 f9 65 8b 05 74 72 d9 77 85 c0 74 02 5d [ 537.159152][ C1] RSP: 0018:ffffc9000602fb50 EFLAGS: 00000286 [ 537.165232][ C1] RAX: 1ffffffff13f8d77 RBX: ffff88808e4ca040 RCX: 1ffffffff16b2529 [ 537.173203][ C1] RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 537.181185][ C1] RBP: ffff8880ae535e00 R08: 0000000000000001 R09: 0000000000000001 [ 537.189150][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880ae535e00 [ 537.197127][ C1] R13: ffff8880a3c5c3c0 R14: 0000000000000000 R15: 0000000000000000 [ 537.205212][ C1] finish_task_switch+0x150/0x790 [ 537.210231][ C1] ? finish_task_switch+0x122/0x790 [ 537.215425][ C1] ? __switch_to+0x425/0xfe0 [ 537.220026][ C1] ? lock_is_held_type+0xbb/0xf0 [ 537.224964][ C1] __schedule+0xed1/0x2280 [ 537.229407][ C1] ? io_schedule_timeout+0x140/0x140 [ 537.234696][ C1] ? _raw_spin_unlock_irqrestore+0x6f/0x90 [ 537.240504][ C1] schedule+0xd0/0x2a0 [ 537.244573][ C1] do_nanosleep+0x222/0x650 [ 537.249083][ C1] ? find_held_lock+0x2d/0x110 [ 537.253881][ C1] ? schedule_timeout_idle+0x80/0x80 [ 537.259297][ C1] ? debug_object_destroy+0x210/0x210 [ 537.264701][ C1] ? memset+0x20/0x40 [ 537.268707][ C1] ? __hrtimer_init+0x136/0x280 [ 537.273686][ C1] hrtimer_nanosleep+0x1f9/0x430 [ 537.278710][ C1] ? nanosleep_copyout+0x100/0x100 [ 537.283851][ C1] ? _copy_from_user+0x138/0x190 [ 537.288812][ C1] ? hrtimer_init_sleeper_on_stack+0x90/0x90 [ 537.294807][ C1] ? put_timespec64+0x120/0x120 [ 537.299660][ C1] ? lock_is_held_type+0xbb/0xf0 [ 537.304600][ C1] __x64_sys_nanosleep+0x1dc/0x260 [ 537.309707][ C1] ? hrtimer_nanosleep+0x430/0x430 [ 537.314814][ C1] ? syscall_enter_from_user_mode+0x20/0x290 [ 537.320786][ C1] ? lockdep_hardirqs_on+0x53/0x100 [ 537.325978][ C1] do_syscall_64+0x2d/0x70 [ 537.330387][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 537.336271][ C1] RIP: 0033:0x45c641 [ 537.340160][ C1] Code: 75 14 b8 23 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 cd fb ff c3 48 83 ec 08 e8 ea 46 00 00 48 89 04 24 b8 23 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 47 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 537.359756][ C1] RSP: 002b:00007ffc17e3f4a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000023 [ 537.368161][ C1] RAX: ffffffffffffffda RBX: 00000000000832b2 RCX: 000000000045c641 [ 537.376122][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffc17e3f4b0 [ 537.384102][ C1] RBP: 0000000000000001 R08: 0000000000e557b5 R09: 0000000000e557b9 [ 537.392073][ C1] R10: 00007ffc17e3f5b0 R11: 0000000000000293 R12: 000000000118cf40 [ 537.400045][ C1] R13: 000000000118d9c0 R14: ffffffffffffffff R15: 000000000118d09c [ 537.408029][ C1] [ 537.410350][ C1] Allocated by task 3920: [ 537.414675][ C1] kasan_save_stack+0x1b/0x40 [ 537.419339][ C1] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 537.424960][ C1] kmem_cache_alloc+0x13a/0x3f0 [ 537.429798][ C1] getname_flags.part.0+0x50/0x4f0 [ 537.434899][ C1] user_path_at_empty+0xa1/0x100 [ 537.439824][ C1] do_readlinkat+0xcd/0x2f0 [ 537.444314][ C1] __x64_sys_readlinkat+0x93/0xf0 [ 537.449329][ C1] do_syscall_64+0x2d/0x70 [ 537.453738][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 537.459611][ C1] [ 537.461947][ C1] Freed by task 3920: [ 537.465917][ C1] kasan_save_stack+0x1b/0x40 [ 537.470584][ C1] kasan_set_track+0x1c/0x30 [ 537.475173][ C1] kasan_set_free_info+0x1b/0x30 [ 537.480096][ C1] __kasan_slab_free+0xd8/0x120 [ 537.484935][ C1] kmem_cache_free.part.0+0x74/0x1e0 [ 537.490207][ C1] putname+0xe1/0x120 [ 537.494182][ C1] filename_lookup+0x3b1/0x560 [ 537.498934][ C1] do_readlinkat+0xcd/0x2f0 [ 537.503441][ C1] __x64_sys_readlinkat+0x93/0xf0 [ 537.508457][ C1] do_syscall_64+0x2d/0x70 [ 537.512862][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 537.518734][ C1] [ 537.521052][ C1] The buggy address belongs to the object at ffff8880a11e2b40 [ 537.521052][ C1] which belongs to the cache names_cache of size 4096 [ 537.535201][ C1] The buggy address is located 1840 bytes to the left of [ 537.535201][ C1] 4096-byte region [ffff8880a11e2b40, ffff8880a11e3b40) [ 537.549093][ C1] The buggy address belongs to the page: [ 537.554730][ C1] page:000000001ef4633c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa11e2 [ 537.564863][ C1] head:000000001ef4633c order:1 compound_mapcount:0 [ 537.571448][ C1] flags: 0xfffe0000010200(slab|head) [ 537.576726][ C1] raw: 00fffe0000010200 ffffea0001372588 ffffea000155bd88 ffff88821bc47a00 [ 537.585305][ C1] raw: 0000000000000000 ffff8880a11e2b40 0000000100000001 0000000000000000 [ 537.593871][ C1] page dumped because: kasan: bad access detected [ 537.600264][ C1] [ 537.602579][ C1] Memory state around the buggy address: [ 537.608197][ C1] ffff8880a11e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 537.616263][ C1] ffff8880a11e2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 537.624334][ C1] >ffff8880a11e2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 537.632380][ C1] ^ [ 537.636959][ C1] ffff8880a11e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 537.645008][ C1] ffff8880a11e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 537.653051][ C1] ================================================================== [ 537.661095][ C1] Disabling lock debugging due to kernel taint [ 537.667352][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 537.673939][ C1] CPU: 1 PID: 21429 Comm: syz-executor.5 Tainted: G B 5.9.0-rc3-syzkaller #0 [ 537.683987][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.694030][ C1] Call Trace: [ 537.697302][ C1] [ 537.700177][ C1] dump_stack+0x198/0x1fd [ 537.704528][ C1] ? tcp_retransmit_timer+0x2c60/0x3240 [ 537.710070][ C1] panic+0x382/0x7fb [ 537.713966][ C1] ? __warn_printk+0xf3/0xf3 [ 537.718556][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 537.724101][ C1] ? trace_hardirqs_on+0x55/0x220 [ 537.729124][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 537.734667][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 537.740226][ C1] end_report+0x4d/0x53 [ 537.744377][ C1] kasan_report.cold+0xd/0x37 [ 537.749051][ C1] ? tcp_retransmit_timer+0x2d4c/0x3240 [ 537.754593][ C1] tcp_retransmit_timer+0x2d4c/0x3240 [ 537.759960][ C1] ? tcp_delack_timer+0x370/0x370 [ 537.764984][ C1] ? lockdep_hardirqs_on_prepare+0x19c/0x530 [ 537.770962][ C1] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 537.777464][ C1] ? lockdep_hardirqs_on+0x53/0x100 [ 537.782666][ C1] ? read_seqcount_t_begin.constprop.0+0x17d/0x1e0 [ 537.789163][ C1] ? read_seqcount_t_begin.constprop.0+0x133/0x1e0 [ 537.795679][ C1] ? ktime_get+0xd8/0x120 [ 537.800010][ C1] tcp_write_timer_handler+0x79b/0xa60 [ 537.805463][ C1] tcp_write_timer+0xa2/0x2b0 [ 537.810139][ C1] call_timer_fn+0x1ac/0x760 [ 537.814723][ C1] ? tcp_write_timer_handler+0xa60/0xa60 [ 537.820352][ C1] ? msleep_interruptible+0x130/0x130 [ 537.825741][ C1] ? lock_downgrade+0x830/0x830 [ 537.830590][ C1] ? _raw_spin_unlock_irq+0x1f/0x80 [ 537.835785][ C1] ? lockdep_hardirqs_on_prepare+0x19c/0x530 [ 537.841759][ C1] ? _raw_spin_unlock_irq+0x1f/0x80 [ 537.846955][ C1] ? tcp_write_timer_handler+0xa60/0xa60 [ 537.852586][ C1] __run_timers.part.0+0x67c/0xaa0 [ 537.857696][ C1] ? call_timer_fn+0x760/0x760 [ 537.862459][ C1] ? kvm_sched_clock_read+0x14/0x40 [ 537.867654][ C1] ? sched_clock+0x2a/0x40 [ 537.872066][ C1] ? sched_clock_cpu+0x18/0x1f0 [ 537.876915][ C1] run_timer_softirq+0xb3/0x1d0 [ 537.881763][ C1] __do_softirq+0x1f8/0xb23 [ 537.886265][ C1] asm_call_on_stack+0xf/0x20 [ 537.890926][ C1] [ 537.893862][ C1] do_softirq_own_stack+0x9d/0xd0 [ 537.898882][ C1] irq_exit_rcu+0x235/0x280 [ 537.903384][ C1] sysvec_apic_timer_interrupt+0x51/0xf0 [ 537.909011][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 537.914984][ C1] RIP: 0010:_raw_spin_unlock_irq+0x4b/0x80 [ 537.920779][ C1] Code: c0 b8 6b fc 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 31 48 83 3d c6 df d3 01 00 74 25 fb 66 0f 1f 44 00 00 01 00 00 00 e8 ab 59 28 f9 65 8b 05 74 72 d9 77 85 c0 74 02 5d [ 537.940373][ C1] RSP: 0018:ffffc9000602fb50 EFLAGS: 00000286 [ 537.946428][ C1] RAX: 1ffffffff13f8d77 RBX: ffff88808e4ca040 RCX: 1ffffffff16b2529 [ 537.954394][ C1] RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 537.962356][ C1] RBP: ffff8880ae535e00 R08: 0000000000000001 R09: 0000000000000001 [ 537.970318][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880ae535e00 [ 537.978281][ C1] R13: ffff8880a3c5c3c0 R14: 0000000000000000 R15: 0000000000000000 [ 537.986271][ C1] finish_task_switch+0x150/0x790 [ 537.991294][ C1] ? finish_task_switch+0x122/0x790 [ 537.996501][ C1] ? __switch_to+0x425/0xfe0 [ 538.001089][ C1] ? lock_is_held_type+0xbb/0xf0 [ 538.006029][ C1] __schedule+0xed1/0x2280 [ 538.010447][ C1] ? io_schedule_timeout+0x140/0x140 [ 538.015731][ C1] ? _raw_spin_unlock_irqrestore+0x6f/0x90 [ 538.021532][ C1] schedule+0xd0/0x2a0 [ 538.025592][ C1] do_nanosleep+0x222/0x650 [ 538.030081][ C1] ? find_held_lock+0x2d/0x110 [ 538.034845][ C1] ? schedule_timeout_idle+0x80/0x80 [ 538.040130][ C1] ? debug_object_destroy+0x210/0x210 [ 538.045484][ C1] ? memset+0x20/0x40 [ 538.049463][ C1] ? __hrtimer_init+0x136/0x280 [ 538.054300][ C1] hrtimer_nanosleep+0x1f9/0x430 [ 538.059227][ C1] ? nanosleep_copyout+0x100/0x100 [ 538.064323][ C1] ? _copy_from_user+0x138/0x190 [ 538.069249][ C1] ? hrtimer_init_sleeper_on_stack+0x90/0x90 [ 538.075211][ C1] ? put_timespec64+0x120/0x120 [ 538.080052][ C1] ? lock_is_held_type+0xbb/0xf0 [ 538.084973][ C1] __x64_sys_nanosleep+0x1dc/0x260 [ 538.090066][ C1] ? hrtimer_nanosleep+0x430/0x430 [ 538.095163][ C1] ? syscall_enter_from_user_mode+0x20/0x290 [ 538.101127][ C1] ? lockdep_hardirqs_on+0x53/0x100 [ 538.106310][ C1] do_syscall_64+0x2d/0x70 [ 538.110724][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 538.116616][ C1] RIP: 0033:0x45c641 [ 538.120497][ C1] Code: 75 14 b8 23 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 cd fb ff c3 48 83 ec 08 e8 ea 46 00 00 48 89 04 24 b8 23 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 33 47 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 538.140082][ C1] RSP: 002b:00007ffc17e3f4a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000023 [ 538.148562][ C1] RAX: ffffffffffffffda RBX: 00000000000832b2 RCX: 000000000045c641 [ 538.156529][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffc17e3f4b0 [ 538.164498][ C1] RBP: 0000000000000001 R08: 0000000000e557b5 R09: 0000000000e557b9 [ 538.172452][ C1] R10: 00007ffc17e3f5b0 R11: 0000000000000293 R12: 000000000118cf40 [ 538.180406][ C1] R13: 000000000118d9c0 R14: ffffffffffffffff R15: 000000000118d09c [ 538.189525][ C1] Kernel Offset: disabled [ 538.193844][ C1] Rebooting in 86400 seconds..